Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@cvetkovv
Copy link
Contributor

…tokens without typ claim

Closes #33332

@cvetkovv
Copy link
Contributor Author

Based on the discussion 33344

@cvetkovv cvetkovv force-pushed the fix-external-token-validation2 branch from 2e82d9e to cec58c1 Compare November 19, 2024 13:59
searchGroups=Search groups
trusted-hosts.tooltip=List of Hosts, which are trusted and are allowed to invoke Client Registration Service and/or be used as values of Client URIs. You can use hostnames or IP addresses. If you use star at the beginning (for example '*.example.com' ) then whole domain example.com will be trusted.
disableNonceHelp=Do not send the nonce parameter in the authentication request. The nonce parameter is sent and verified by default.
disableTypeClaimCheckHelp=Do not validate the type claim. The type claim is validated by default.
Copy link
Contributor

@thomasdarimont thomasdarimont Nov 19, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it would be helpful to enhance this message a bit for clarity, e.g.:

Disables the validation of the `typ` claim of tokens received from the Identity Provider. If this is `off` the type claim is validated (default).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

done

@DenEwout
Copy link

Added a thumbs up for visibility.

@berevlad
Copy link

berevlad commented Jan 3, 2025

Hello, any ETA for this to be closed ? :)

edewit
edewit previously approved these changes Feb 3, 2025
Copy link
Contributor

@edewit edewit left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍 from a UI perspective

@mbobzin
Copy link

mbobzin commented Feb 14, 2025

We have a similar issue with Okta tokens, they don't contain the typ claim. This PR would solve our problem.

@ahus1 ahus1 force-pushed the fix-external-token-validation2 branch from 83f3c13 to f510250 Compare March 10, 2025 20:47
@ahus1 ahus1 self-assigned this Mar 10, 2025
@ahus1 ahus1 force-pushed the fix-external-token-validation2 branch from f510250 to 83f3c13 Compare March 10, 2025 21:01
@ahus1
Copy link
Contributor

ahus1 commented Mar 10, 2025

@cvetkovv - can you please rebase your PR? The test case unfortunately picked up conflict. Thanks!

…tokens without typ claim

Closes keycloak#33332

Signed-off-by: Venelin Cvetkov <[email protected]>
@cvetkovv cvetkovv force-pushed the fix-external-token-validation2 branch from 83f3c13 to eddaca8 Compare March 11, 2025 06:09
Copy link
Contributor

@edewit edewit left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Contributor

@thomasdarimont thomasdarimont left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Contributor

@ahus1 ahus1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving based on previous reviews. Thank you for fixing this often-requested issue!

@ahus1 ahus1 merged commit d388dc7 into keycloak:main Mar 20, 2025
77 checks passed
ybasket added a commit to ybasket/terraform-provider-keycloak that referenced this pull request Apr 11, 2025
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider.
ybasket added a commit to ybasket/terraform-provider-keycloak that referenced this pull request Apr 11, 2025
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider.

Signed-off-by: Yannick Heiber <[email protected]>
sschu added a commit to keycloak/terraform-provider-keycloak that referenced this pull request Jun 20, 2025
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider.

Signed-off-by: Yannick Heiber <[email protected]>
Co-authored-by: Sebastian Schuster <[email protected]>
viniciusd pushed a commit to viniciusd/terraform-provider-keycloak that referenced this pull request Jun 27, 2025
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider.

Signed-off-by: Yannick Heiber <[email protected]>
Co-authored-by: Sebastian Schuster <[email protected]>
Signed-off-by: Vinicius Dantas <[email protected]>
horus pushed a commit to horus/terraform-provider-keycloak that referenced this pull request Jul 6, 2025
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider.

Signed-off-by: Yannick Heiber <[email protected]>
Co-authored-by: Sebastian Schuster <[email protected]>
Signed-off-by: horus <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

External token (not issued by Keycloak) cannot be validated in token exchange flow in case user info check is disabled

7 participants