-
-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Optional issuer validation? #7
Comments
Hi, thank you for your feedback! I am going to handle upcomming issues for this project, so I will check, that we can do just for this case. Microsoft is not that small company, so I think making life easier for consumers of their OIDC makes sense. |
Specs are actually pretty clear about this. https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata
I think we have here the following options:
I do not think it is right thing, to allow to skip validation easily. It is described as "MUST" in specification. But I also think happy user is more important. What do you think? Which variant from those 3 fits your needs best of all? Or maybe another idea? |
Ah someone wrote an excellent post about the issue: https://medium.com/@abhinavsonkar/making-azure-ad-oidc-compliant-5734b70c43ff I think actually this solves my problem 😅 |
Settings |
I'd be okay extending the validation. For my workflow it may be to unpack the claims grab the tid and replace |
Ah the IdToken is the one with |
I might end up writing my own validate_token 😓 |
@jetersen should we still improve this somehow in library? |
well, clearly azure ad's oidc is not compliant 😓 |
I think probably, if Microsoft so specific - we can add feature This feature will enable providers::microsoft::* And there we can put all, that can make help other with Microsoft OpenID implementation. |
The upstream issue: https://github.com/MicrosoftDocs/azure-docs/issues/95994 I think this is a good suggested workaround: ramosbugs/openidconnect-rs#121 (comment) (Not validating the |
Seems like there is MS specific field |
Hi, Thanks for this library.
I wonder what the best way to solve an issue I have with validating the issuer. Microsoft OIDC uses
{tenantId}
in the issuer URL returned in the claims.In the claims I can request the
tid
to get the tenant id.For now I have a branch of openid where I just ignore the issuer check. Would be interested in a upstream change that would allow for optional issuer check? Or perhaps you have another suggestion.
See: https://login.microsoftonline.com/organizations/v2.0/.well-known/openid-configuration
openid/src/client.rs
Lines 254 to 258 in 94cb5e9
The text was updated successfully, but these errors were encountered: