-
Notifications
You must be signed in to change notification settings - Fork 24
Reflect issuer_state in access_token #317
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
IssuerStateRule is already set to be executed on AuthCodeGrant: src/Server/Grants/AuthCodeGrant.php:754
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## wip-vci #317 +/- ##
=============================================
- Coverage 42.31% 42.07% -0.24%
- Complexity 1870 1883 +13
=============================================
Files 160 160
Lines 8565 8620 +55
=============================================
+ Hits 3624 3627 +3
- Misses 4941 4993 +52 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Conformance tests are passing, which is good! Tomorrow I'll try to implement issuer state check for the internal issuer, as otherwise I'll miss that check. |
|
@mrvanes please check if everything works for you after all the changes. |
|
Everything still works like a charm after the refinement commits. Thank you! |
|
Thanks for the contribution! |
To completely separate the issuer from authorization server the
issuer_stateshould not be checked in the authorization endpoint, but simply be accepted as an opaque identifier and afterwards be reflected in theaccess_token.The issuer then should compare the previously offered
issuer_stateagainst theissuer_statein theaccess_tokenin order to verify that the state in theaccess_tokenreflects the received claims of theuserinfoendpoint.This PR does not implement the native issuer
access_tokenissuer_stateinspection!