-
Notifications
You must be signed in to change notification settings - Fork 5.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Certificate-Bound (POP) Opaque Access Token Validation #14888
Comments
Hi @jgrandja ! It seems to me that such validation is impossible for opaque tokens, for example, in my case, the token is an ordinary guid. But even if we consider the rare case - jwt-based opaque token, then the introspection endpoint call must perform all the checks on its own and return the correct result. Currently
It's written in the comments: "relying solely on the authorization server to validate this token (not checking 'exp', for example)" |
@CrazyParanoid
Anything is possible. But currently there is no Either way, let's see how many upvotes this issue gets before we prioritize it in a release. |
I think the API limitation is that In that case, it may be more appropriate to have the |
Maybe it would be better to make this task more global? For example, Support Opaque Token Validation. You can add an interface something like:
Then in
But even if this is implemented, it is necessary to make such validations optional, for example through setting |
I don't think this would be appropriate in this case since such validation is not part of the introspection spec and thus not a part of the token. Further, the information that would be needed (the certificate itself) is neither part of the access token being introspected (it's just a As per the diagram, the certificate is handed by the client to the resource server, separately from the token. The token is introspected, and the certificate is verified separately from that. |
I probably expressed myself incorrectly when I said that this is impossible. This is not practical. Since the authorization server performs all validation during the introspection, there is no point in implementing such validations in the framework. |
This issue is related to gh-10538 and will address validating certificate-bound "opaque" access tokens for both the Servlet and Reactive stacks.
The text was updated successfully, but these errors were encountered: