Replies: 5 comments 3 replies
-
This is so weird, I think I just posted the same problem at nearly the exact same time - #1273 |
Beta Was this translation helpful? Give feedback.
-
what Identity Provider software are you using? the "aud" validation was tightened up since 2.4.16 to match what is in the spec https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation and to be able to pass the associated conformance test https://www.certification.openid.net/log-detail.html?log=4CZRVc9jcxew0hz |
Beta Was this translation helpful? Give feedback.
-
I agree that it makes sense to make the |
Beta Was this translation helpful? Give feedback.
-
see a14ed22 which will be included in the upcoming 2.4.16.5 release |
Beta Was this translation helpful? Give feedback.
-
backwards compatibility is now provided as of release 2.4.16.5: https://github.com/OpenIDC/mod_auth_openidc/releases/tag/v2.4.16.5 |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I have a problem with too tight claim "aud" validation.
RFC: https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.3
says there could be multiple values StringOrURL (that's correct in my case) and I received there also URL.
That's problem since:
src/proto/id_token.c:
There is hard validation added which tests only 1 entry in aud array. I see no config option to tune this.
I would like to ask if this is something must have (I have no possibility to affect our oauth server part) or can it be somehow configurable (enable/disable this validation, configure how many entries are ok, what values - e.g. regexp - should be there, ...).
Beta Was this translation helpful? Give feedback.
All reactions