-
Notifications
You must be signed in to change notification settings - Fork 398
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Logout Token Validation Support? #211
Comments
This package currently doesn't implement logout token logic. It'd be helpful to know what providers implement this and what real-world use cases look like. |
Ory Hydra implements OpenID Connect Back-Channel Logout 1.0 which has logout token logic. |
Sorry, last time I gave an unusual example. I would like to update. There are many oidc server implementation supports this feature. For example: I know google's oidc server hasn't support this feature yet, but this project doesn't restrict its users to google's oidc service only, right? To solve the logout validation problem I have already had solution based on this project, may I make contribution to here? |
Since those specs are still a Draft we'd probably want to wait before adding new APIs to this package. You should be able to use most of the Verify method to validate a logout token. Then use Claims() to pull out the events and sid claims. Does that satisfy your use case? |
@ericchiang now that the spec is final, will the PR be reviewed or considered? |
Hi @ericchiang. Learnt of the backchannel logout feature from this discussion knadh/listmonk#2143 +1 for #251 |
According to: https://openid.net/specs/openid-connect-backchannel-1_0.html#Validation
I think if there is a function like
func (v *IDTokenVerifier) Verify
for Logout Token Validation would be nice... Or is there already a function that I could call?The text was updated successfully, but these errors were encountered: