[OPENAM-16314] Create OAuth2/OIDC Node to allow same authentication methods used and supported by our own OpenID Connect provider and clients Created: 02/Jun/20 Updated: 24/Feb/21 |
|
Status: | Open |
Project: | OpenAM |
Component/s: | authentication, oauth2, OpenID Connect |
Affects Version/s: | None |
Fix Version/s: | None |
Type: | New Feature | Priority: | Major |
Reporter: | Jochen Raymaekers | Assignee: | Unassigned |
Resolution: | Unresolved | Votes: | 2 |
Labels: | CustomerRFE, NEWTON | ||
Σ Remaining Estimate: | Not Specified | Remaining Estimate: | Not Specified |
Σ Time Spent: | Not Specified | Time Spent: | Not Specified |
Σ Original Estimate: | Not Specified | Original Estimate: | Not Specified |
Description |
When using oauth2/openid connect authentication module/node, the client always authenticates to OpenID Connect provider using client_secret_post. I was looking into our Social OIDC Node and came across https://bugster.forgerock.org/jira/browse/OPENAM-9779. As I'm aware when we are the OIDC Provider we support the private_key_jwt for our clients but not when we connect towards another provider. So the issue above could be easily included in our OIDC Node normally as we already created something likewise for our own OAuth 2.0 Client configurations. Acceptance Criteria
|
Comments |
Comment by Andrew Forrest [ 13/Oct/20 ] |
Season planning: initial estimate of 8 points |
Comment by Andrew Forrest [ 01/Dec/20 ] |
Andy Hall the title appears to talk about supporting all authn methods that we support as an OP, and yet the description talks only about private_key_jwt. How should we scope this? Also, just to confirm, we are not looking at the OIDC node, but rather social provider handler node? |
Comment by Michael Carter [ 15/Dec/20 ] |
Andy Hall Do we need to support tls_client_auth and self_signed_tls_client_auth as well, given that AM as OP supports them? We've assumed yes for the time being. |
Comment by Andy Hall [ 25/Jan/21 ] |
Michael Carter Yes. |
Comment by Michael Carter [ 27/Jan/21 ] |
See https://tools.ietf.org/html/rfc8705 for tls client auth stuff. |
Comment by Kevin Umebolu [ 27/Jan/21 ] |
Link to RFC: https://datatracker.ietf.org/doc/rfc8705/ |