Replies: 1 comment 5 replies
-
|
The current behaviour is the only correct one as per the updated guidance on Client Authentication Assertions following fix to a recent vulnerability
That's why it's there. So that you can override claims that don't work for a particular provider.
Discovery doesn't even accept this option, not sure what you're referring to. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I ran into the following issues with the Assertion Tokens when using this library with Okta.
The value set by this library for the
audclaim of the assertion tokens is different, than what Okta expects.While
openid-clientseems to set theaudclaim equal to issuer value (URL), Okta expects theaudclaim to equal the full URL of the specific endpoint for which the assertion token is to be used. (e.g."aud":"<issuer-url>/<token-endpoint-path>"rather than just"aud": "<issuer-url>")This is documented here (see
audclaim).I am aware that the audience claim can be overridden, via the
client.modifyAssertionoption, however this does not allow computing theaudclaim value based on the requested URL, as the only available information is the original assertion tokens header and / or payload.Am I missing something or is the desired behavior not possible as of now with this library?
From how I understand the specification, both is in theory acceptable as both values clearly identify the issuer.
Also it seems that I am unable to define the assertionToken payload override anywhere aside from the client discovery function, is this really the only way to apply the logic?
@panva do you have any insights on this?
Beta Was this translation helpful? Give feedback.
All reactions