You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
New section title: Configure an OpenID Connect client to use Private Key JWT authentication
Content:
OpenID Connect clients are required to provide authentication data to the OpenID Connect provider when they invoke the provider’s token endpoint. Clients can authenticate using several different methods, but most of those methods require a client secret. The private_key_jwt authentication method enables clients to use asymmetric keys to create signed JSON Web Tokens (JWTs) to authenticate instead of client secrets. OpenID Connect clients using this authentication method are no longer required to have a client secret.
Server administrators can enable this functionality using the private_key_jwt option for the tokenEndpointAuthMethod attribute, as well as the tokenEndpointAuthSigningAlgorithm and keyAliasName attributes in either the openidConnectClient or oidcLogin elements in their server.xml file.
The following example shows a configuration that uses the Private Key JWT token endpoint authentication method.
The tokenEndpointAuthSigningAlgorithm attribute specifies the signing algorithm to sign the JWT that is used for client authentication. The keyAliasName attribute points to the key to use to sign the JWT, and must also be the alias for the public key that corresponds to the private key. The private key must be in the keystore that is specified by the SSL configuration that is referenced by sslRef in the OIDC client configuration. The public key must be in one of the following:
the truststore that is specified by the trustStoreRef attribute in the openidConnectClient element
the truststore that is specified by the SSL configuration that is referenced by sslRef
the keystore that is specified by the SSL configuration that is referenced by sslRef
For more information about the configuration options, refer to the docs for the openidConnectClient element.
I completely overlooked that this section is already in the vNext branch, and I would imagine be getting put into the official documentation some time after 23.0.0.9 is released. So this issue can be disregarded.
Relevant docs page: https://openliberty.io/docs/latest/reference/feature/openidConnectClient-1.0.html
File to update: https://github.com/OpenLiberty/docs/blob/vNext/modules/reference/pages/feature/openidConnectClient/examples.adoc
New section title: Configure an OpenID Connect client to use Private Key JWT authentication
Content:
OpenID Connect clients are required to provide authentication data to the OpenID Connect provider when they invoke the provider’s token endpoint. Clients can authenticate using several different methods, but most of those methods require a client secret. The
private_key_jwt
authentication method enables clients to use asymmetric keys to create signed JSON Web Tokens (JWTs) to authenticate instead of client secrets. OpenID Connect clients using this authentication method are no longer required to have a client secret.Server administrators can enable this functionality using the
private_key_jwt
option for thetokenEndpointAuthMethod
attribute, as well as thetokenEndpointAuthSigningAlgorithm
andkeyAliasName
attributes in either theopenidConnectClient
oroidcLogin
elements in their server.xml file.The following example shows a configuration that uses the Private Key JWT token endpoint authentication method.
The
tokenEndpointAuthSigningAlgorithm
attribute specifies the signing algorithm to sign the JWT that is used for client authentication. ThekeyAliasName
attribute points to the key to use to sign the JWT, and must also be the alias for the public key that corresponds to the private key. The private key must be in the keystore that is specified by the SSL configuration that is referenced bysslRef
in the OIDC client configuration. The public key must be in one of the following:trustStoreRef
attribute in theopenidConnectClient
elementsslRef
sslRef
For more information about the configuration options, refer to the docs for the openidConnectClient element.
For more information about private_key_jwt client authentication, refer to the OpenID Connect core specification and RFC 7523.
The text was updated successfully, but these errors were encountered: