-
-
Notifications
You must be signed in to change notification settings - Fork 365
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Encrypted JWTs for both id_tokens and client assertions #631
Comments
@aeneasr For the ID token etc., this is relatively easy to accomplish with a custom implementation of JWTStrategy and performing the encryption on the Generate function. Perhaps a couple of client properties should be made available such as the algorithms to be used. I would just match it to the client_metadata properties in the DCR spec. However, for inbound (client_assertion, request_object etc.), a new This should be a relatively simple extension with a simple example. Please let me know if this makes sense. |
Sorry for the late reply, that sounds like a good approach! |
@aeneasr This is regarding a change I see in the master branch.
It looks like it is just a name change from |
Primarily because it is only used to sign tokens currently, but we can also name it something else |
Hello contributors! I am marking this issue as stale as it has not received any engagement from the community or maintainers for a year. That does not imply that the issue has no merit! If you feel strongly about this issue
Throughout its lifetime, Ory has received over 10.000 issues and PRs. To sustain that growth, we need to prioritize and focus on issues that are important to the community. A good indication of importance, and thus priority, is activity on a topic. Unfortunately, burnout has become a topic of concern amongst open-source projects. It can lead to severe personal and health issues as well as opening catastrophic attack vectors. The motivation for this automation is to help prioritize issues in the backlog and not ignore, reject, or belittle anyone. If this issue was marked as stale erroneously you can exempt it by adding the Thank you for your understanding and to anyone who participated in the conversation! And as written above, please do participate in the conversation if this topic is important to you! Thank you 🙏✌️ |
Is your feature request related to a problem? Please describe.
ID tokens and client assertions (both for JWT bearer grant flow and for private_key_jwt authentication) are generally signed and optionally encrypted. In general, an encrypted token requirement comes up in industries like government or finance.
Describe the solution you'd like
The request is to add this capability by default in Fosite with an extension, effectively, to the JWTStrategy.
Describe alternatives you've considered
Additional context
N/A
The text was updated successfully, but these errors were encountered: