Replies: 2 comments
-
|
so is this not fix at all? |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
In v6.x the options that are available on the PrivateKeyJwt client authentication method allow for this sort of customization. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
The issue is simple, as described a while back in #642 -- I would like to use
private_key_jwtwith Azure, to the same extent that I can with Okta. Granted, a little work-around is needed, as described in #423, and that's fine, but that alone is not sufficient (anymore?).In particular, it seems that Azure insists there be an
x5tvalue in the header that is the thumbprint of the public key. No problem, I can jam that in there by hacking the openid-client library.That's obviously a hack, but it demonstrates that there is a simple fix. The question I have is, what's the right way to make it possible to add JWT header values from a design perspective, without being annoying or breaking backward compatibility? Azure needs
x5tbut would also like to havetyp: "JWT"for some reason, despite it working fine without it.I am using the latest release of openid-client, and the code that I have to set up the passport strategy looks like this:
In case it matters, the error that Azure returns looks like this:
Let me know what you think about this issue. I'll be happy to code a proper solution and submit a PR, taking any guidance you can offer into account. Thank you.
Beta Was this translation helpful? Give feedback.
All reactions