Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: remove id_token flow with freeform provider #927

Merged
merged 1 commit into from
Feb 2, 2023

Conversation

hf
Copy link
Contributor

@hf hf commented Feb 1, 2023

The POST /token?grant_type=id_token implementation allowed any OpenID Connect compliant issuer to be used for authentication, albeit in a very limited and broken way. Given we are not supporting this at this time, the implementation is being removed.

Existing OIDC providers, importantly google and apple continue to be supported.

@hf hf requested a review from a team as a code owner February 1, 2023 14:47
@hf hf merged commit 2646967 into master Feb 2, 2023
@hf hf deleted the hf/remove-id-token-with-freeform-provider branch February 2, 2023 17:36
@github-actions
Copy link
Contributor

github-actions bot commented Feb 2, 2023

🎉 This PR is included in version 2.44.0 🎉

The release is available on GitHub release

Your semantic-release bot 📦🚀

hf added a commit that referenced this pull request Feb 6, 2023
hf added a commit that referenced this pull request Feb 6, 2023
Reverts #927 due to identifying that some users do
actually use this API but only for Apple and Google. I'll come back with
another PR that blocks non-Apple and Google issuers only.
uxodb pushed a commit to uxodb/auth that referenced this pull request Nov 13, 2024
The `POST /token?grant_type=id_token` implementation allowed any OpenID
Connect compliant issuer to be used for authentication, albeit in a very
limited and broken way. Given we are not supporting this at this time,
the implementation is being removed.

Existing OIDC providers, importantly `google` and `apple` continue to be
supported.
uxodb pushed a commit to uxodb/auth that referenced this pull request Nov 13, 2024
…e#933)

Reverts supabase#927 due to identifying that some users do
actually use this API but only for Apple and Google. I'll come back with
another PR that blocks non-Apple and Google issuers only.
LashaJini pushed a commit to LashaJini/auth that referenced this pull request Nov 13, 2024
The `POST /token?grant_type=id_token` implementation allowed any OpenID
Connect compliant issuer to be used for authentication, albeit in a very
limited and broken way. Given we are not supporting this at this time,
the implementation is being removed.

Existing OIDC providers, importantly `google` and `apple` continue to be
supported.
LashaJini pushed a commit to LashaJini/auth that referenced this pull request Nov 13, 2024
…e#933)

Reverts supabase#927 due to identifying that some users do
actually use this API but only for Apple and Google. I'll come back with
another PR that blocks non-Apple and Google issuers only.
LashaJini pushed a commit to LashaJini/auth that referenced this pull request Nov 15, 2024
The `POST /token?grant_type=id_token` implementation allowed any OpenID
Connect compliant issuer to be used for authentication, albeit in a very
limited and broken way. Given we are not supporting this at this time,
the implementation is being removed.

Existing OIDC providers, importantly `google` and `apple` continue to be
supported.
LashaJini pushed a commit to LashaJini/auth that referenced this pull request Nov 15, 2024
…e#933)

Reverts supabase#927 due to identifying that some users do
actually use this API but only for Apple and Google. I'll come back with
another PR that blocks non-Apple and Google issuers only.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants