Handle 3rd party initiated login in OIDC in a different endpoint #43258
Labels
enhancement
New value added to drive a business result
Feature:Security/Authentication
Platform Security - Authentication
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
So far we use the
rp.redirect_uri
both for RP initiated and 3rd party initiated logins. This should work in most cases but breaks when an OpenID Provider responds to an rp initiated Authentication Request with a redirect to theredirect_uri
that contains aniss
parameter.In this case, since we check for
iss
first, we assume this is a new request for a Third party initiated login and we send a new Authentication Request to the OP, which ends up in an infinite loop and probably anERR_TOO_MANY_REDIRECTS
in the browser.There is no reason for an OP to send the
iss
parameter in an authentication response, but at the same time the Spec dictates that an RPMUST
ignore any unknown parameters when validating an authentication response.We could try changing our logic to check for the existence of a
code
parameter first (or anid_token
in the case of an implicit flow ) but I'd suggest we simply support and additional endpoint as thelogin initiation endpoint
for supporting Third party initiated login.The text was updated successfully, but these errors were encountered: