Ping Identity tokens validation (https://auth.pingone.com/) #216
-
Here is my spring addon config: BFF:
Resource Server:
but this does not work because I do not know where to go next. All in all, I am stuck. Please advise. |
Beta Was this translation helpful? Give feedback.
Replies: 10 comments 9 replies
-
This token is a valid opaque token (not a JWT), what Ping Identity calls a token reference. There is no chance that a JWT decoder can validate it and that's why you get a You could use introspection instead of JWT decoding, but this would have a serious impact on your system's efficiency and scalability. I strongly advise that you contact Ping Identity support to get help configuring your authorization server to issue JWTs as access tokens (instead of token references).
|
Beta Was this translation helpful? Give feedback.
-
Access token:
|
Beta Was this translation helpful? Give feedback.
-
I added the |
Beta Was this translation helpful? Give feedback.
-
here is the GW config:
|
Beta Was this translation helpful? Give feedback.
-
Lastly, here is the redacted wellknown openid config:
|
Beta Was this translation helpful? Give feedback.
-
With my current setup, the BFF is functional and sends a BEARER token to the resource server, with www-authenticate with the access token. I get a 401 unauthorized for While debugging, I see the error here:
with the InvalidBearerTokenException
|
Beta Was this translation helpful? Give feedback.
-
With Postman, I was able to get values from the
If the user has the Start_Authorization for a given app (APPXXXX), he can proceed. The entitlement group further clarifies what finer-grained control the user has to have to access other app functionalities. This is where I get stuck when I integrate your framework for the |
Beta Was this translation helpful? Give feedback.
-
That's some decently detailed info. Thank you.
Can you please post here the payload you get when introspecting an access token and specify which claim(s) you want to be mapped as Spring Security authorities (with which prefix for each)? May I ask how you got this token? Breakpoint in the BFF and reading the
|
Beta Was this translation helpful? Give feedback.
-
Thanks. Unfortunately, I cannot request a global change like that. Given the constraint, what is my best course of action?
what do you recommend? |
Beta Was this translation helpful? Give feedback.
-
One last attempt in using spring-addons:
Should I abandon the idea of using spring add-on and continue my journey? Please advise. |
Beta Was this translation helpful? Give feedback.
This token is a valid opaque token (not a JWT), what Ping Identity calls a token reference. There is no chance that a JWT decoder can validate it and that's why you get a
401
.You could use introspection instead of JWT decoding, but this would have a serious impact on your system's efficiency and scalability. I strongly advise that you contact Ping Identity support to get help configuring your authorization server to issue JWTs as access tokens (instead of token references).