You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When IS 6.1.0 is configured as a third party key manager, a connector is added to the IS. This connector has a custom scope validator (RoleBasedScopeIssuer) [1]. Here, we add a scope name default to the allowed scope list when the allowed scope list is empty. This has been the default behaviour in previous APIM versions as well. The revamp in [2] has introduced an additional check in the scope validation flow that checks whether the scopes requested by the user are included in the allowed scope list. The APIM scenario breaks with this new change.
Description
Hi team,
When IS 6.1.0 is configured as a third party key manager, a connector is added to the IS. This connector has a custom scope validator (RoleBasedScopeIssuer) [1]. Here, we add a scope name default to the allowed scope list when the allowed scope list is empty. This has been the default behaviour in previous APIM versions as well. The revamp in [2] has introduced an additional check in the scope validation flow that checks whether the scopes requested by the user are included in the allowed scope list. The APIM scenario breaks with this new change.
[1] - https://github.com/wso2-support/apim-km-wso2is/blob/support-1.6.8.x-full/components/wso2is.key.manager.core/src/main/java/org/wso2/is/key/manager/core/tokenmgt/issuers/RoleBasedScopesIssuer.java
[2] - wso2-extensions/identity-inbound-auth-oauth#1975
Steps to Reproduce
Setup IS 6.1.0 as the KM with APIM 4.2.0 and try out the auth code grant without requesting any scopes
Version
6.1.0
Environment Details (with versions)
No response
The text was updated successfully, but these errors were encountered: