You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I don't get any of the user information (I would have expected to see at least the display name and the email) available through the userinfo endpoint (available in the discovery endpoint) synchronized with my matrix account.
From what I can see in the OIDC specification the only user related information the id token is supposed to contain is the subject and if the authenticator need to resolve all the user claims (those par of profile and email) it asked the authentication endpoint to authorize it's supposed to go through the userinfo endpoint.
Hello, I found myself confronted with this same issue today.
I use LemonLdap::NG as a SSO provider which, by default, fills the id_token only with core user attributes. The OIDC reference states, in its section about id tokens, that the token MAY (in the RFC sense) contain other claims; that is, it may just as well not include other claims without breaking the normative text. However, the comment here suggests that the authors assumed that the token MUST contain other claims.
As such, the userinfo endpoint should be queried to fill the user infos: by default, my SSO provider did not provide preferred_username, resulting in a 500 error because the correctly-identified used had an empty localpart.
This issue has been migrated from #9316.
I don't get any of the user information (I would have expected to see at least the display name and the email) available through the userinfo endpoint (available in the discovery endpoint) synchronized with my matrix account.
According to https://github.com/matrix-org/synapse/blob/v1.26.0/synapse/handlers/oidc_handler.py#L342 the authenticator seems to assume that the concept of userinfo endpoint is not really part of the OpenID Connect protocol and expect user related claims to be provided by the id token as soon as the scopes contains "oidc".
From what I can see in the OIDC specification the only user related information the id token is supposed to contain is the subject and if the authenticator need to resolve all the user claims (those par of profile and email) it asked the authentication endpoint to authorize it's supposed to go through the userinfo endpoint.
Synapse version: 1.26.0
My oidc config:
I'm testing with https://app.element.io as client.
The text was updated successfully, but these errors were encountered: