-
Notifications
You must be signed in to change notification settings - Fork 7.9k
Add config param disableTypeClaimCheck in order to validate external … #35075
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
c2bfc05 to
2e82d9e
Compare
|
Based on the discussion 33344 |
2e82d9e to
cec58c1
Compare
| searchGroups=Search groups | ||
| trusted-hosts.tooltip=List of Hosts, which are trusted and are allowed to invoke Client Registration Service and/or be used as values of Client URIs. You can use hostnames or IP addresses. If you use star at the beginning (for example '*.example.com' ) then whole domain example.com will be trusted. | ||
| disableNonceHelp=Do not send the nonce parameter in the authentication request. The nonce parameter is sent and verified by default. | ||
| disableTypeClaimCheckHelp=Do not validate the type claim. The type claim is validated by default. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it would be helpful to enhance this message a bit for clarity, e.g.:
Disables the validation of the `typ` claim of tokens received from the Identity Provider. If this is `off` the type claim is validated (default).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
cec58c1 to
83f3c13
Compare
|
Added a thumbs up for visibility. |
|
Hello, any ETA for this to be closed ? :) |
edewit
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 from a UI perspective
|
We have a similar issue with Okta tokens, they don't contain the typ claim. This PR would solve our problem. |
83f3c13 to
f510250
Compare
f510250 to
83f3c13
Compare
|
@cvetkovv - can you please rebase your PR? The test case unfortunately picked up conflict. Thanks! |
…tokens without typ claim Closes keycloak#33332 Signed-off-by: Venelin Cvetkov <[email protected]>
83f3c13 to
eddaca8
Compare
edewit
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
thomasdarimont
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
ahus1
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approving based on previous reviews. Thank you for fixing this often-requested issue!
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider.
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider. Signed-off-by: Yannick Heiber <[email protected]>
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider. Signed-off-by: Yannick Heiber <[email protected]> Co-authored-by: Sebastian Schuster <[email protected]>
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider. Signed-off-by: Yannick Heiber <[email protected]> Co-authored-by: Sebastian Schuster <[email protected]> Signed-off-by: Vinicius Dantas <[email protected]>
Keycloak 26.2.0 adds a new option for the OIDC identity provider to disable checking the "typ" claim in incoming tokens. See keycloak/keycloak#35075. This adds support for this option to the Terraform provider. Signed-off-by: Yannick Heiber <[email protected]> Co-authored-by: Sebastian Schuster <[email protected]> Signed-off-by: horus <[email protected]>
…tokens without typ claim
Closes #33332