You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Kratos does not utilize userinfo call even though a provider has to be OIDC compliant.
In my scenario I have a legacy oauth2 server that is used by some applications. I did not want to alter existing code of this server.
So I choose to create a layer above this server that implemented the OIDC layer as well as the userinfo call.
This userinfo call returns some extra information that is necessary for newer applications and this information is not pressent in the id_token.
I've scoped through the code of the generic_provider and I could not see a userinfo call being used.
I can confirm this when I am going over the login flow and follow traces in the new service. No calls are made to the new userinfo call.
Reproducing the bug
Deploy a Kratos instance
Deploy a OIDC compliant service that returns a trait over the userinfo call that is not pressent in the id_token
Configure this service using the generic_provider in Kratos
Follow the login flow and login via OIDC with the above-mentioned service
The trait will not be in the received claims in the jsonnet mapper.
Relevant log output
No response
Relevant configuration
For debugging purposes, I have outputted all the claims to the traits object in the jsonnet mapper.# kratos.ymlselfservice:
oidc:
enabled: trueconfig:
providers:
- id: oidc_providerprovider: genericsubject_source: userinfoissuer_url: http://localhost:8081mapper_url: file://./mappers/oidc_provider_mapper.jsonnetrequested_claims:
id_token:
? nameuserinfo:
? customscope:
- profile
- openid
### Version
v1.0.0
### On which operating system are you observing this issue?
Linux
### In which environment are you deploying?
Docker Compose
### Additional Context
_No response_
The text was updated successfully, but these errors were encountered:
I have found other issues mentioned above; but the solution was to create a custom provider. I understand in this case, since the implementation is pretty specific. But was a generic_oidc_provider considered anywhere along the way?
Preflight checklist
Ory Network Project
No response
Describe the bug
Kratos does not utilize userinfo call even though a provider has to be OIDC compliant.
In my scenario I have a legacy oauth2 server that is used by some applications. I did not want to alter existing code of this server.
So I choose to create a layer above this server that implemented the OIDC layer as well as the userinfo call.
This userinfo call returns some extra information that is necessary for newer applications and this information is not pressent in the id_token.
I've scoped through the code of the generic_provider and I could not see a userinfo call being used.
I can confirm this when I am going over the login flow and follow traces in the new service. No calls are made to the new userinfo call.
Reproducing the bug
The trait will not be in the received
claims
in the jsonnet mapper.Relevant log output
No response
Relevant configuration
The text was updated successfully, but these errors were encountered: