Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support RFC 7662 tokens from multiple issuers #70

Open
jbasney opened this issue Jan 30, 2020 · 1 comment
Open

Support RFC 7662 tokens from multiple issuers #70

jbasney opened this issue Jan 30, 2020 · 1 comment
Labels
enhancement New feature or request

Comments

@jbasney
Copy link

jbasney commented Jan 30, 2020

Feature request: Support RFC 7662 tokens from open source issuers (e.g., https://github.com/indigo-iam)

I think currently only tokens from globus.org are accepted. For example, the "https://auth.globus.org/scopes/" namespace appears to be hard-coded:

const char * prefix = "https://auth.globus.org/scopes/";

I expect that by moving constants like this into configuration files, oauth-ssh could accept tokens from other issues with different namespaces. Alternatively, we could specify an (xsede.org?) namespace that multiple issuers could support.

@rpwagner
Copy link

That's for creating this issue. I completely agree that other tokens relying on RFC 7662 for introspection should be supported. We've dealt with this within another project where we supported custom prefixes for the tokens globus:<opaque>, which isn't in the spirit of RFC 7662 but deals with the practical issue of determining the issuer of an opaque token. The simpler alternative is to use a try-fail approach through a set of RFC 7662 introspection endpoints. I would suggest articulating the scopes along with the introspection endpoints, which would cover both mechanisms.

@JasonAlt JasonAlt added the enhancement New feature or request label Oct 11, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants