Replies: 5 comments 3 replies
-
This is so weird, I think I just posted the same problem at nearly the exact same time - #1273 |
Beta Was this translation helpful? Give feedback.
-
what Identity Provider software are you using? the "aud" validation was tightened up since 2.4.16 to match what is in the spec https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation and to be able to pass the associated conformance test https://www.certification.openid.net/log-detail.html?log=4CZRVc9jcxew0hz |
Beta Was this translation helpful? Give feedback.
-
I agree that it makes sense to make the |
Beta Was this translation helpful? Give feedback.
-
see a14ed22 which will be included in the upcoming 2.4.16.5 release |
Beta Was this translation helpful? Give feedback.
-
backwards compatibility is now provided as of release 2.4.16.5: https://github.com/OpenIDC/mod_auth_openidc/releases/tag/v2.4.16.5 |
Beta Was this translation helpful? Give feedback.
-
I have a problem with too tight claim "aud" validation.
RFC: https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.3
says there could be multiple values StringOrURL (that's correct in my case) and I received there also URL.
That's problem since:
src/proto/id_token.c:
There is hard validation added which tests only 1 entry in aud array. I see no config option to tune this.
I would like to ask if this is something must have (I have no possibility to affect our oauth server part) or can it be somehow configurable (enable/disable this validation, configure how many entries are ok, what values - e.g. regexp - should be there, ...).
Beta Was this translation helpful? Give feedback.
All reactions