Skip to content

Support OpenID Connect Discovery to pull in endpoint urls and keysets #22

Open
@andytson

Description

@andytson

All OpenID Connect standard compliant servers implement .well-known endpoints for discovering underlying endpoint urls and public keys (multiple for issues like rotation)

There is complexity is in converting the keysets from JWK format to PEM

If implementing discovery, provider configuration would then be at the minimum:

  • issuerUrl - The url of the IdP, which underneath sits .well-known/openid-configuration
  • clientId - (if authenticating, not required for validation if allowedAudience supplied)
  • clientSecret - (if the IdP server requires it for authenticating)
  • allowedAudience - (optional for validation, matching either the string aud claim, or if aud claim is an array, one of the array entries)

note azp should not need to match clientId or audience if the service using the client is a resource server validating the access token, as another client could be entitled to access the resource server via a matching allowedAudience

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions