-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
closes #2311 - wellknown is missing pkce related info #2547
Conversation
Thank you! The idea here being that we follow https://datatracker.ietf.org/doc/html/rfc8414 ? |
Hi @aeneasr. Just pointing out section-2 of the above RFC that describes the required parameter to inform the oidc client that this authorization server supports PKCE. I'm assuming that PKCE (as described in RFC7636) is already implemented. If this is true then we must advertise the "PKCE Code Challenge Methods".
|
I see, thank you! As far as I can tell, it appears that the linked RFC would assume providing this information at a different endpoint (not So I think it would make sense to open a new endpoint to follow this RFC and then add the values there? |
I believe that we can use the existing URL as many other providers do it (such as google: https://accounts.google.com/.well-known/openid-configuration) |
I checked the RFC and it looks to me as they strictly require the document to be discoverable at However, as you said, this also appears to be exposed at |
Hi @aeneasr, I haven't used any OIDC sdks. However, I have written my own for educational purposes ONLY (https://github.com/gbolo/muggle-oidc/blob/main/oidc/discovery.go#L21) which respects this parameter at I quickly looked around for any popular openid sdks and i found this one for js which seems to do something similar: https://github.com/panva/node-openid-client If you would prefer to make a separate endpoint, I can try to update the PR to accomplish that |
As it has come up before for other endpoints (e.g. revokation) I think it would make sense to implement RFC 8414 according to spec so we can address the other things as well then :) I think that would be the most straight forward way & spec compliant. If there is indeed a popular library expecting this at openid-configuration we could still add it there (as i. this PR:) ) |
hey @aeneasr after reading the section 3 you pointed out, it seems like we are fine keeping it the same:
|
I finally found the relevant line in the spec (RFC 8414):
And OpenID Provider Metadata says
So adding RFC 8414 to OpenID PM should be allowed :) Thus not requiring a new endpoint! |
Related issue
#2311 - wellknown is missing pkce related info
Proposed changes
adds additional parameters to wellknown response as defined in RFC 8414
Checklist
vulnerability. If this pull request addresses a security. vulnerability, I
confirm that I got green light (please contact
security@ory.sh) from the maintainers to push
the changes.
works.