-
Notifications
You must be signed in to change notification settings - Fork 7
Problems with Token Introspection #43
Comments
I think I've taken care of the 5 bullet points. |
Regarding configurable claims per client. Would it not be reasonable to have that information in some kind of database ? With perhaps a default if the client can't be found in the database ? |
Yes, we were thinking of using the client database for this. Then follows the question if registration should be modified too, to allow setting the default claims on client creation. But that could be another conversation. |
That would definitely be another discussion. |
We should probably deal with claims in the similar way to how scopes are now dealt with. |
After some work, this is what I have right now:
|
So if I understand this correctly, adding a claim to #52 the PR with configurable introspection claims allows this, although I guess you would like to combine it with the custom scopes etc. |
Do you want This means that we might have claims that appear in access tokens or are returned from the introspection endpoint that are not among the claims supported. |
Yes that's what I meant and wanted.
This seems good. |
@rohe this Is a good thread to explain in the documentation I think |
There are some issues regarding the token introspection endpoint:
self.endpoint_context.sdb[token]
in do_access_token raises KeyError in the case of not-existing token. This is not handled (the if/else could be changed to a try except)within its given time window of validity
, which means that the iss/nbf should be checked also to be before the current time.This may be a little off-topic, but we are also interested in allowing configurable claims per client for the introspection response.
The text was updated successfully, but these errors were encountered: