Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide local validation of OAuth 2.0 JWT Access Tokens #343

Open
MartinFlores751 opened this issue Oct 3, 2024 · 3 comments
Open

Provide local validation of OAuth 2.0 JWT Access Tokens #343

MartinFlores751 opened this issue Oct 3, 2024 · 3 comments
Assignees
Labels
enhancement New feature or request
Milestone

Comments

@MartinFlores751
Copy link
Contributor

Using the OAuth 2.0 Access Token JWT Profile1, we should be able to validate access tokens for OpenID providers who give JWT access tokens but don't provide an introspection endpoint. This should cover most OpenID providers, though some providers may not provide either standard methods.

Footnotes

  1. https://www.rfc-editor.org/rfc/rfc9068

@MartinFlores751 MartinFlores751 self-assigned this Oct 3, 2024
@korydraughn korydraughn added the enhancement New feature or request label Oct 3, 2024
@korydraughn
Copy link
Contributor

Does this overlap with any existing OAuth issues?

@MartinFlores751
Copy link
Contributor Author

Not from what I can tell. It's a bit adjacent to the validating tokens issue, though that's focused on our 'client mode'. This issue is focused on 'protected resource mode'.

@korydraughn
Copy link
Contributor

Okay. Placing in the 0.5.0 milestone for now.

Can bump it if necessary.

@korydraughn korydraughn added this to the 0.5.0 milestone Oct 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants