-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce 'scope' option to oidc jwt in client credentials grant flow #34686
Conversation
Thanks for your pull request! The title of your pull request does not follow our editorial rules. Could you have a look?
This message is automatically generated by a bot. |
@lordvlad thanks for the PR, can you do a few minor updates please, there should be a constant for the scope in Thanks |
|
In some cases, the jwt passed in a client-credentials grant flow requires a claim. This commit introduces the option
|
@sberyozkin thanks for the feedback. Have another look now. Should I squash the commits now or will github do that on merge? Also, why won't you allow lambdas? Issues in native mode? |
Hi @lordvlad Sorry for a delay, I've been wondering how to test this new property - we do have integration tests for various client JWT authentication options, also
Please squash once the test is complete
My understanding it might have at least marginal performance cost |
@lordvlad I can help with the test if you'd like but hopefully it won't take a lot of your time |
@lordvlad I've pushed a basic test - we need to customize the separator, space should be |
Hey. Thanks for the update, I'll try and update in the upcoming days.
…On Thu, Jul 13, 2023, 18:21 Sergey Beryozkin ***@***.***> wrote:
@lordvlad <https://github.com/lordvlad> I've pushed a basic test - we
need to customize the separator, space should be default, please add
another property similarly to how it is done for OidcTenantConfig, thanks
—
Reply to this email directly, view it on GitHub
<#34686 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAJJJ2L4UN7CZSK2ECNDWKTXQAOCLANCNFSM6AAAAAA2GO5G3A>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@lordvlad hi, np, I might add it, it is just that by default it is usually a space, thanks |
@sberyozkin done. Extended tests. Had to adjust the test cause |
Thanks @lordvlad, nicely done. I've been actually thinking about this PR over the weekend, I wanted to ask a question, why is The main reason I'm asking, we have to introduce 2 properties to cover a scope claim string, but I wonder if it is the right time to do what we do with the additional, possibly non-standard properties for starting and completing authorization code flow, for the extra oidc client parameters, etc. I think we can introduce an
A bit more verbose but now we can cover whatever custom claims this token needs to have. Does it sound reasonable to you ? I can update the PR... |
It really seems to be very specific to this provider (netsuite), I haven't encountered that anywhere else yet. Making it more generic makes absolute sense, sure! Though maybe |
@lordvlad |
@lordvlad Looks like you merging the main branch into this PR has caused problems. Unless I'm mistaken, the right way to continue is to recreate PR in a new branch, cherry-picking all commits made prior to the merge; you can probably avoid it but this is how I used to deal with similar cases, Guillaume was advising something along these lines. |
Superceded by #34883 |
In some cases, the jwt passed in a client-credentials grant flow requires a scop claim. This commit introduces the option.
Let me know if I should update the docs somewhere.