-
-
Notifications
You must be signed in to change notification settings - Fork 9.6k
[Security] Support JWE on OidcTokenHandler #50441
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I'd say it's a new feature given solving it implies to extend the configuration.
Note that pretty much everything may be encrypted in OIDC interactions, even UserInfo success responses used by |
Thank you for this suggestion. |
Hey @carsonbot, let's keep this one open, I just didn't have time to focus on it yet. |
Thank you for this suggestion. |
Hey @carsonbot, let's keep this one open, I just didn't have time to focus on it yet. |
…IDC tokens (Spomky) This PR was merged into the 7.3 branch. Discussion ---------- [Security][SecurityBundle] Add encryption support to OIDC tokens | Q | A | ------------- | --- | Branch? | 7.3 | Bug fix? | no | New feature? | yes | Deprecations? | no | Issues | Fix #50441 | License | MIT The changes add encryption support to OpenID Connect (OIDC) tokens in the Symfony Security Bundle. This is useful in making the application more secure. They also ensure the tokens are correctly decrypted and validated before use. Additionally, tests have been expanded to cover these new scenarios. ```yaml security: firewalls: main: pattern: ^/ access_token: token_handler: oidc: ... encryption: enabled: true algorithms: [...] keyset: '{"keys": [{...}]}' ``` Commits ------- 04c53b4 [Security] OAuth2 Introspection Endpoint (RFC7662)
Description
The OIDC Core Specification recommends to decrypt the ID Token if it's encrypted:
AFAIK, JWE are not often used. But as Symfony supports OIDC feature (experimentally), it could be interesting to support JWE. It concerns only OidcTokenHandler.
Question: should it be a new feature or a bugfix (as it's part of the Core Specification)?
Example
To decrypt a JWE, a public JWK is required. Hopefully, it is available on
/certs
endpoint on OIDC server, so we can import it dynamically (cf. #50434).The text was updated successfully, but these errors were encountered: