-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Implement UserInfo Endpoint #176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hey, I'd love to take this when it opens up. |
Thanks for your interest @idosal. Please ping me towards end of January as a reminder. |
Hey @jgrandja , let me know when you're going to start working on OPENID Connect. I also want to work when it opens up |
@jgrandja Still waiting on this. :) |
Thanks for the offer @amit-github-personal . Work has already started on OIDC with #53 being merged last month. As well, @idosal reached out last month and is interested in taking on this feature. Please stay tuned for upcoming features as they open up. It looks like features planned for @idosal I'm planning on focusing on |
@jgrandja Thanks, I'll get on it. |
Hey @jgrandja, after reviewing the spec I started playing around with the code. I have a few questions I'd like to clear up:
|
It is part of this task. The "source" for the claims will come from the attributes in the Resource Owner's For example, let's assume the configuration of a specific Authorization Server deployment authenticates users against an LDAP directory. During the authentication process, it will authenticate the user and upon successful authentication it will set the Does this make sense? FYI, there are a few different ways the client can request claims. For this initial iteration, we will need to support "5.4. Requesting Claims using Scope Values" (defined in Regarding your 2nd point, we will not support JWS, JWE or Nested JWS within JWE for the UserInfo response. We'll keep it simple for the initial iteration, which is to return a |
any update on this? |
@Benzenes I'm on it. I was a little delayed due to personal circumstances, but I'll open a draft in the next few days. |
@idosal How are things coming along? Were you able to make any progress? |
will this userinfo endpoint return the user authorities as well? i.e. roles |
@deejonz, work on this endpoint has not been merged to main yet. In the PR, authorities would not be returned by default. However, the PR currently exposes a customization hook allowing you to provide your own mapper in which you could add anything you wish to the endpoint's response. |
@sjohnr Hi, do you mean the userInfoMapper? Otherwise can you point me to this hook you're talking about? Thanks. |
@deejonz, yes, that's the one. |
thanks @sjohnr can you please give me an example how to call it? I really don't find a way. |
Hi @deejonz, This test demonstrates it. Perhaps you're asking how to use the configurer? You can check out numerous tests in this package to see some general examples of the |
Hi @sjohnr, it wasn't very straightforward but I managed to implement it, thanks a lot for your help! |
Hi @sjohnr sorry another question, why don't you leave OidcUserInfoClaimsMapper free to be extended for this purpose? |
Thanks for your interest, @deejonz. There are several reasons, but the primary reason is that we always start with implementations that are closed, and slowly open up things that make sense to once APIs stabilize. If you have a specific use case you're trying to achieve with the User Info Endpoint, let's wait until we get this merged, and you can open an issue with a description of that use case and why you feel this is needed. We can then discuss it and alternatives. Does that sound ok? |
yes, that sounds ok. Thanks @sjohnr |
This issue will deliver OpenID Connect 1.0 UserInfo Endpoint.
Related gh-53
The text was updated successfully, but these errors were encountered: