-
-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OIDC: Look to support PKCE and/or nonce #4734
Comments
Hi Dan, I heard about this issue from a colleague and while I don't have the detailed knowledge myself, I hang out in a channel with auth oracles and tried to gather some information. I will just add some hypotheses to be verified:
If you have more questions about that topic I can recommend the community channel of kanidm. Kani is the idp I use and the community and maintainers have strong knowledge about all the auth things. |
Thanks for the valuable insight @tumbl3w33d. I've just been reading through the PKCE RFC. We'll need to be sure to update our OIDC guidance if adding by default, to advise enforcing PKCE on the auth system server side, otherwise it's of limited benefit. |
Related to #4734. Uses core logic from League AbstractProvider.
PR now open for adding PKCE, targeted for the next feature release: #4804 |
Alrighty, #4804 is now merged. Either way, there were no issues with enabling by default, and it's now in as an enhanced layer of security for OIDC where supported. |
With the intention to provide an extra layer of security.
Looks like there may be some overlap between these potential options, so may need to assess benefits relative to support and requirement by Identity providers.
Relevant articles:
The text was updated successfully, but these errors were encountered: