Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Avoid treating IdTokens issued by providers as internal IdTokens #23070

Merged
merged 1 commit into from
Jan 21, 2022

Conversation

sberyozkin
Copy link
Member

@sberyozkin sberyozkin commented Jan 20, 2022

Fixes #23007.

I just added an internal header qualifier when generating an internal token to prevent treating the ID tokens issued by the providers as the internal ones when quarkus.oidc.authentication.id-token-required=false. (in theory, they might also have an internal header - but it is probably close to 0 then I can do internal_something_random but I don't think it will be necessary).
Tested it by updating one of Keycloak tests (yes, it was failing before I applied a fix :-)).

@FroMage FroMage merged commit 536c024 into quarkusio:main Jan 21, 2022
@quarkus-bot quarkus-bot bot added this to the 2.8 - main milestone Jan 21, 2022
@sberyozkin sberyozkin deleted the oidc_id_token_not_required_fix branch January 21, 2022 17:43
@gsmet gsmet modified the milestones: 2.8 - main, 2.7.0.Final Jan 21, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

OIDC: Something wrong happens when verifying our internal JWT
3 participants