Use OAuth 2.0 Token Introspection during log in #27
Loading…
x
Reference in New Issue
Block a user
No description provided.
Delete Branch "oauth2-token-instrospection-login"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This is basically the same as DMC/scipro#141
Currently, it uses an endpoint similar to OpenID Connect UserInfo but with some differences. The endpoint does not require the "openid" scope for example. There is an ongoing effort to replace the OAuth 2.0 authorization server with a more standard compliant one which would break the endpoint (since it would require the "openid" scope). It is currently not possible to request the "openid" scope to future-proof since Spring would act differently if that scope is present and assume full OpenID Connect. That leads to requiring an id token to have been issued which the current authorization server does not do.
To get around this the implementation is changed to use a standard compliant Token Introspection endpoint to get access to the subject of the access token (which is the only part that's necessary right now). Since the endpoint is standard compliant it will work with any future authorization server.
It may be necessary to run docker compose up --build to get the latest version of the Toker containers.
Use OAuth 2.0 Token Introspection during log into WIP: Use OAuth 2.0 Token Introspection during log inWIP: Use OAuth 2.0 Token Introspection during log into Use OAuth 2.0 Token Introspection during log inWorks as expected. Good find on the bug in the login handler that used the wrong username.
Thanks for the clean up! :)
I did the comments to check the spelling :)