-
Notifications
You must be signed in to change notification settings - Fork 689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement RFC 9207 #1213
Comments
Interesting! Looking at the RFC it's currently "Proposed Standard" so even though not fully mature still good enough to already consider implementing it. Tagged your suggestion accordingly, as a feature-request. |
I've created the PR to fix this. The only thing that I'm not sure is reporting the error:
|
I am unsure about the first question, but for the second I think it might make sense to not throw any error at all if we do not know of support for the spec, since an Authorization Server might throw all kinds of other parameters in there, and they may not be aware that a new spec suddenly popped up defining a new parameter in the IANA Registry. Thanks for implementing this 👍 |
@bellebaum do you mean throwing an error in this case:
So, if authorization_response_iss_parameter_supported is not supplied in AS metadata but the 'iss' param returned by AS is really an issuer id, this can be fixed with setting |
Not sure why the RFC says that, but I can live with it :) |
Hi, what's the status of this issue ? Is this gonna merge ? |
Hi @manfredsteyer , are there any plans to fix this issue? |
Workaround for those who use Keycloak OpenId Provider |
@manfredsteyer Any chance to get this merged? Have to switch this off in e.g. Keycloak feels like not holding up to the latest open id connect /oAuth 2 standards. |
Hi, I'm currently looking at #1327 I'll update you soon. |
Recently, a new OAuth response parameter was defined in RFC 9207:
iss
The basic idea is that if a server advertises
authorization_response_iss_parameter_supported
astrue
in its metadata (or we know of support via explicit configuration), the client should only accept the response ifiss
matches the server's issuer identifier.Furthermore: This Client clears several OAuth/OpenID response parameters after login (e.g.
code
orstate
).The following code should clear
iss
as well:angular-oauth2-oidc/projects/lib/src/oauth-service.ts
Lines 1743 to 1761 in d95d7da
At a minimum, this should free sites of having to manually clear the
iss
when using compliant servers. When properly implemented, some sites might even benefit from the mix-up countermeasure.The text was updated successfully, but these errors were encountered: