Skip to content

Introduce Authorization Server bound to the RS as per new solid-oidc #27

@damooo

Description

@damooo

Blocked due to client support as in inrupt/solid-client-authn-js#3181

Also must prune following temporary adjustments, that were introduced for client support.

  1. ath claim in dpop proofs must be mandatory. and following temp-fix must be resolved.
    let decoded_ath = decoded_claims
    .ath
    .as_ref()
    // TODO MUST remove following feature and block.
    .or_else(|| cfg!(feature = "unsafe-optional-ath-claim").then_some(&ath))
    .ok_or(InvalidDPoPProof::AthClaimMismatch)?;
  2. azp claimis currenly (de)serialized as client_id for ecosystem interoperability.
    /// Authorized party.
    #[serde(alias = "client_id")]
    pub azp: String,
    /// Audience.
  3. aud claim currently accepts single value too.
    /// Audience.
    // NOTE: for NSS idp compat, allows deserializing from a string.
    // TODO remove special handling.
    #[serde(deserialize_with = "string_or_vec")]
    pub aud: Vec<String>,

Once solid-client follows the spec, and solidos follows, these changes will be merged.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions