Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Let OIDC users block the opaque tokens if only JWT tokens are expected #17471

Merged
merged 1 commit into from
May 26, 2021

Conversation

sberyozkin
Copy link
Member

Fixes #17457.

This PR introduces a new quarkus.oidc.token.allow-opaque-token-introspection property to support the secure deployments expecting JWT tokens only and wishing to avoid any potential slowing down of the endpoint when an opaque (possibly intentionally misformatted JWT sequence) token is sent to Quarkus - since the only way to verify the opaque token is to attempt to verify it remotely

@sberyozkin sberyozkin requested a review from pedroigor May 26, 2021 12:06
@sberyozkin
Copy link
Member Author

@pedroigor indeed by default this property is enabled since quarkus-oidc does support the opaque tokens OOB (well, as long as the OIDC provider has an introspection endpoint :-) ), but it can be set to false

@sberyozkin
Copy link
Member Author

Proposing for a backport as it is a low risk enhancement

@sberyozkin sberyozkin merged commit fe07bc0 into quarkusio:main May 26, 2021
@quarkus-bot quarkus-bot bot added this to the 2.0 - main milestone May 26, 2021
@sberyozkin sberyozkin deleted the oidc_allow_opaque_tokens branch May 26, 2021 19:49
@gsmet gsmet modified the milestones: 2.1 - main, 2.0.0.CR2 May 27, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

OIDC introspection (opaque access token, not jwt)
3 participants