How to handle Third Party Initiated Login with Passport Strategy #510
Replies: 3 comments
-
|
@panva could I get your opinion on how this should be behave? |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
@panva circling back to this, I'm still unsure if mutating the |
Beta Was this translation helpful? Give feedback.
0 replies
-
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'm working on a Okta initiated login and seeing an error I wasn't expecting. Okta will send an
issquery param as per section 4 of the spec, however, that triggersopenid-clientinto starting the auth response flow instead of the auth request flow.eg. a call to
https://my-org.com/login/sso/some-idp-id?iss=https%3A%2F%2Fsome-org.okta.comresults in the error:"did not find expected authorization request details in session, req.session["oidc:some-org.okta.com"] is undefined"Here is the smallest reproduction I came up with:
In my case I'll be using dedicated URL paths for each IdP, so my code has no need for the
issparam.I think I expected
openid-clientto assert theissagainst theIssueror ignore it.My impression is that this is a bug or missing feature from the library itself.
Currently, my only option would be to override the
IncomingMessage.urlby stripping the query, but that seems like kludge.Which direction should I go?
Beta Was this translation helpful? Give feedback.
All reactions