Skip to content

Comments

Do not enforce UserInfo for OAuth2 if user prefers not to#52719

Open
sberyozkin wants to merge 1 commit intoquarkusio:mainfrom
sberyozkin:no_id_token_no_user_info_for_oauth2
Open

Do not enforce UserInfo for OAuth2 if user prefers not to#52719
sberyozkin wants to merge 1 commit intoquarkusio:mainfrom
sberyozkin:no_id_token_no_user_info_for_oauth2

Conversation

@sberyozkin
Copy link
Member

@sberyozkin sberyozkin commented Feb 23, 2026

Fixes #52651.

OAuth2 login should work only with the authorization and token endpoint URLs if it is what the users want - to have an authenticated access and use the access token to access this provider's API.

With this PR I was able to import GitHub MCP Server using the OAuth2 option.

These 2 properties in a test

quarkus.oidc.github-no-id-token-no-user-info.authentication.verify-access-token=false
quarkus.oidc.github-no-id-token-no-user-info.token.verify-access-token-with-user-info=false

do not have be set generally, it just happens the github provider set in the test enables verify-access-token-with-user-info and the code flow access token is activated because JsonWebToken is injected in some resources

@quarkus-bot
Copy link

quarkus-bot bot commented Feb 23, 2026

Status for workflow Quarkus CI

This is the status report for running Quarkus CI on commit 0d31abc.

Failing Jobs

Status Name Step Failures Logs Raw logs Build scan
✔️ JVM Tests - JDK 17 Logs Raw logs 🔍
✔️ JVM Tests - JDK 21 Logs Raw logs 🔍
✔️ JVM Tests - JDK 25 Logs Raw logs 🔍
JVM Tests - JDK 25 Semeru Build ⚠️ Check → Logs Raw logs 🚧

You can consult the Develocity build scans.

Copy link
Member

@michalvavrik michalvavrik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I thought about it a long while. I'd prefer if we were verifying a code flow to access token, but if user want to risk it fine. It would be nice if there was at least warning logged, or maybe there is warning logged on every request? Sorry, I had a long day so I didn't try it myself.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Relax quarkus-oidc requirement that UserInfo endpoint must be available for OAuth2 login to succeed

2 participants