Replies: 2 comments 1 reply
-
I am also facing a similar situation where my oidc provider is strict about the typ key in the header and thus failing to exchange token. @panva is there any change you can include the typ parameter in the header by default ? Or provide a way to customise the header keys ? |
Beta Was this translation helpful? Give feedback.
0 replies
-
What |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I am trying to implement the "private_key_jwt" flow for token endpoint. In the current implementation of
client.grant()
, the protected header is defaulted to{alg}
. However, the OP I am integrating with enforces an additional fieldtyp
requirement.When passing in
client_assertion
field into theclient.grant()
method'sbody
parameter, it will get overwritten by the JWT that is generated by inside the method.Some potential ideas:
body
field inclient.grant()
typ
field in the protected header of the JWT generated insideclient.grant()
-> similar to the behaviour inclient.requestObject()
https://github.com/panva/node-openid-client/blob/47a549cb4e36ffe2ebfe2dc9d6b69a02643cc0a9/lib/client.js#L1508extras
inclient.grant()
, accept a new parameterclientAssertionHeader
for extra parameters to be sent as part of JWT protected header, similar to the current behaviour forclientAssertionPayload
Beta Was this translation helpful? Give feedback.
All reactions