-
Notifications
You must be signed in to change notification settings - Fork 6k
Retrieving the UserInfo should be optional #4451
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Any progress on this? We could revert to proceeding with user details from the id token... |
@kschulst No progress on this as of yet. Working on other higher priority items. The |
Ah, thanks for the heads up. I'm doing a Proof of Concept of creating an AWS Cognito oauth client (which does not provide a /userinfo endpoint), and could probably easily get by with some local modifications then. Let me know if it is interesting to contribute back an example of a Cognito integration ... |
My understanding of the OpenID Connect Core 1.0 spec is that the UserInfo Endpoint request is still required with Authorization Code Flow, at least when From Section 5.4 of the spec:
So the OIDC compliant provider wouldn't include claims related to |
@kschulst I'm not familiar with AWS Cognito but if it implements OpenID Connect Core 1.0 then it will expose a UserInfo Endpoint. However, if it does not implement OpenID Connect Core 1.0 and just implements standard OAuth 2.0 then it should still provide a non-standard API for obtaining information of the authenticated user. Your AWS Cognito oauth client must be authorized by an authenticated user before it's receives an Access Token when using the Authorization Code Grant flow. After the oauth client receives the Access Token, it will then use it to initiate the request to the userinfo endpoint to obtain information for the authenticated user. I would dig deeper into the AWS Cognito API's to see what endpoint they expose for obtaining information for the authenticated user. |
@vpavic Yes that is correct, when However, we still can achieve authentication for OIDC authorization code grant flow because the ID Token contains the |
Hey @jgrandja - yes, it makes sense. My comment was probably more suited for #4312 but since that one was closed I decided to comment here as the two are related. I should have added that I do agree that call to As a user, if I issue an authorization request (or better said authentication request considering the OIDC context) with additional OIDC scopes ( That sort of implies 3 values for configuring |
@vpavic Yeah #4312 was logged a while back and back then I wasn't familiar with the spec as much so wasn't sure of the difference between IdToken and UserInfo. Excellent point as far as the 3 configuration values: Thanks for noting this here. I will consider this when I get to this issue. |
For OIDC authentication flow, fetching the
UserInfo
should be optional as we are able to leverage theid_token
to complete the authentication.We should provide a configuration to allow for enabling/disabling the fetching of the
UserInfo
for the OIDC authentication flow.The text was updated successfully, but these errors were encountered: