-
Notifications
You must be signed in to change notification settings - Fork 5.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide support for OAuth 2.0 Token Exchange for client #5199
Comments
Hi, This feature is removed from the 5.2.x milestone. May I know if any plan about this feature? Many thanks. Thanks and regards, |
@William1104 We are planning on implementing this feature but it may be too early at the moment until the spec goes through the review process further. Instead we replaced this feature with #6053. As an FYI, you can also exchange a JWT token for another JWT using the JWT Bearer grant. I'm curious, are you aware of any providers that have implemented OAuth 2.0 Token Exchange? |
One example would be Keycloak (https://www.keycloak.org/):
|
@jgrandja I am facing this problem where spring security isn't sending the scopes to auth server (azure). I traced it back to Is there a way I can override this behavior? |
@kdhindsa The issue you are having is not related to this issue (Token Exchange). Please post this question on StackOverflow or log a new issue if you believe this is a bug. Please see guidelines on using GitHub Issues.
Have you configured the Please see the reference doc for more details. I suspect there is a misconfiguration. |
@jgrandja, yes, I had configured the scopes correctly:
but that didn't work. Eventually I found this configuration:
So I ended up creating my custom response client service which manually injects scopes:
and that worked. |
Hi @jgrandja, after lots of draft versions, the corresponding RFC 8693 standard for token exchange has finally been published this week (https://tools.ietf.org/html/rfc8693). So it would be great if you could schedule this in one of the next milestones. |
Thanks for the heads up @andifalk. I don't think we'll be able to get this into 5.3 (due Mar 4) as we have other priority tasks that need to be completed. We'll likely target 5.4 |
This issue seems quite old now... Is this feature still in the roadmap for Spring Security? https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-16 |
@emedina RFC 8693 was just published in Jan 2020, as mentioned in this comment. Now that it's published, we will see which providers implement to determine the appropriate time to implement on our end. At the same time, features will get implemented quicker by the community via PR's as our team only has so much bandwidth. As of now, this feature is not scheduled for 5.4 but if a PR comes in then we will consider it then. |
@jgrandja Does this issue get resolved now? |
@ZxShirley It's not scheduled as of yet. As mentioned in my previous comment...
We'll be prioritizing features when we plan for 5.5, which will be towards end of this month. |
Any update on when this will be prioritized as RFC 8693 was been defined for over a year now? Many providers are supporting this now such as keycloak, ping federate, etc. |
These additional constants are used for optional parameters in the Access Token Request for the OAuth 2.0 Token Exchange Grant. Issue gh-5199
We need to provide support for OAuth 2.0 Token Exchange RFC 8693
Related #6053
The text was updated successfully, but these errors were encountered: