Comments (2)
@ay4toh5i I don't understand why you are opening a bug if there is already a feature request #515 which you are clearly aware of? From our point of view, if a new guideline or standard is published, the implementation of such standard is a feature or enhancement, not a bug.
We maintain a list features in the https://github.com/zitadel/oidc/blob/main/README.md#features. Only if we misbehave with regards to the mentioned standards, we consider that a bug.
We do appreciate the PR which you send, I will have a look at it shortly.
from oidc.
@muhlemmer
This issue concerns the behavior of the response_mode
being not form_post
.
The specification OpenID Connect Core 1.0(2014) includes the response_mode
parameter and it refers to OAuth 2.0 Multiple Response Type Encoding Practices(2014)
in the description of the response_mode
.
So this specification is not a new standard, but is already included OpenID Connect Core 1.0
.
That document states that under no circumstances should a set of Authorization Response parameters, whose default Response Mode is the fragment encoding, be encoded using the query encoding.
As you mentioned, zitadel/oidc
should have implemented OpenID Connect Core 1.0 implicit flow
.
Therefore, I believe this behavior could be considered a deviation from the expected standard and may need to be addressed as such.
from oidc.
Related Issues (20)
- JWT Assertion payload does not match RFC example when generated with OIDC relying party HOT 8
- [Bug]: Client Assertion token request includes basic auth header HOT 3
- PKCE support is not enough HOT 1
- use trace id of external service HOT 2
- Allow custom forwarded header HOT 2
- [Bug]: client invalid signature when OIDC server is restarted HOT 2
- The automated release is failing 🚨
- [Bug]: nil pointer dereference in `crypto.BytesToPrivateKey` HOT 3
- Access to auto discovery configuration HOT 3
- Allow empty nonce from ID Tokens issued from Refresh Tokens HOT 10
- Support form_post OIDC response mode HOT 4
- Do not ignore all JWKS parsing errors HOT 1
- [Bug]: nil pointer dereference when not setting unauthorized handler HOT 2
- Switch to `log/slog` HOT 2
- Support ``verification_url`` mispelling in the device auth response HOT 6
- Set IDTokenSigningAlgValuesSupported of DiscoveryConfiguration obtained by Discover when initializing RelyingParty. HOT 3
- Update to go-jose/v4 HOT 4
- add prometheus metrics for apis HOT 2
- JWT Profile Grant: return id_token if openid scope is set HOT 11
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from oidc.