Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Adding Support For CIBA with RAR #679

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 11 commits into from
Mar 21, 2025
Merged

Adding Support For CIBA with RAR #679

merged 11 commits into from
Mar 21, 2025

Conversation

kishore7snehil
Copy link
Contributor

Changes

  • Added support for Rich Authorization Request in CIBA.

References

Testing

  • This change adds test coverage

  • This change has been tested on the latest version of the platform/language or why not

Contributor Checklist

@kishore7snehil kishore7snehil requested a review from a team as a code owner March 19, 2025 18:50
pmathew92
pmathew92 previously approved these changes Mar 19, 2025
Widcket
Widcket previously approved these changes Mar 19, 2025
@developerkunal developerkunal dismissed stale reviews from Widcket and pmathew92 via 62a8b01 March 20, 2025 02:30
@kishore7snehil kishore7snehil merged commit 4d2d1ad into master Mar 21, 2025
10 checks passed
@kishore7snehil kishore7snehil deleted the feature/ciba_rar branch March 21, 2025 08:47
@kishore7snehil kishore7snehil mentioned this pull request Apr 1, 2025
kishore7snehil added a commit that referenced this pull request Apr 1, 2025
**Added**
- feat: Federated Connections Support
[\#682](#682)
([kishore7snehil](https://github.com/kishore7snehil))
- Adding Support For CIBA with RAR
[\#679](#679)
([kishore7snehil](https://github.com/kishore7snehil))
nzetzl pushed a commit to nzetzl/auth0-python-nzetzl-fork that referenced this pull request Apr 2, 2025
### Changes

- Added support for Rich Authorization Request in CIBA.


### References

- [Open
ID](https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html)
- [User Authentication with
CIBA](https://auth0.com/docs/get-started/authentication-and-authorization-flow/client-initiated-backchannel-authentication-flow/user-authentication-with-ciba)

- [Configure Client-Initiated Backchannel
Authentication](https://auth0.com/docs/get-started/applications/configure-client-initiated-backchannel-authentication#integrate-guardian-sdk-into-your-application)

### Testing

- [x] This change adds test coverage

- [x] This change has been tested on the latest version of the
platform/language or why not

### Contributor Checklist

- [x] I agree to adhere to the [Auth0 General Contribution
Guidelines](https://github.com/auth0/open-source-template/blob/master/GENERAL-CONTRIBUTING.md).
- [x] I agree to uphold the [Auth0 Code of
Conduct](https://github.com/auth0/open-source-template/blob/master/CODE-OF-CONDUCT.md).

---------

Co-authored-by: Kunal Dawar <[email protected]>
nzetzl pushed a commit to nzetzl/auth0-python-nzetzl-fork that referenced this pull request Apr 2, 2025
**Added**
- feat: Federated Connections Support
[\auth0#682](auth0#682)
([kishore7snehil](https://github.com/kishore7snehil))
- Adding Support For CIBA with RAR
[\auth0#679](auth0#679)
([kishore7snehil](https://github.com/kishore7snehil))
Comment on lines +85 to +100
authorization_details=[
{
"type":"payment_initiation","locations":["https://example.com/payments"],
"instructedAmount":
{
"currency":"EUR","amount":"123.50"
},
"creditorName":"Merchant A",
"creditorAccount":
{
"bic":"ABCIDEFFXXX",
"iban":"DE021001001093071118603"
},
"remittanceInformationUnstructured":"Ref Number Merchant"
}
],
Copy link
Member

@siacomuzzi siacomuzzi May 15, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@kishore7snehil this won't work in a real scenario, because the request content-type is application/x-www-form-urlencoded
So, in order to support RAR, the back_channel_login should convert the authorization_details value to string (eg, json.dumps(authorization_details)) before include it as part of the authenticated_post data.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants