Comments (3)
Hey @esumit
Thanks for the issue. You're right, at the moment the library does not handle de/encryption of tokens, whether RP nor OP.
The intention is to add this in the future. But we haven't had a use case ourselves yet. So I'd be interested to hear what yours is.
From your screenshot I believe you're trying to verify the access token on the OP. Is this correct?
If so, could you tell me more about your case. As far as I can see, the OP will only have to validate tokens issued by himself. So decrypting will only be necessary if he encrypted the token himself, which is not possible by the library at the moment.
from oidc.
Closing this issue as it looks inactive. Feel free to reopen
from oidc.
@livio-a Sorry on the delay in my response. βIn my case - I tried to use VerifyAccessToken function ! on that flow I assumed that output of Decrypt function would be utilized by ParseToken (As ParseToken given the error)
func DecryptToken(tokenString string) (string, error) {
return tokenString, nil //TODO: impl
}
then I thought may be something supposed to get implemented on DecryptToken ? so reported the issue. (it was my first time using go oidc library for some of the APIs to have access token way of access when called from another internal service)
from oidc.
Related Issues (20)
- Can't revoke token HOT 1
- allow to set audiences for device authorization
- return an ID token with Device Authorizaiton HOT 1
- [Spike]: OpenID Conformance testing suite
- Need to add a "typ":"JWT" header to my tokens HOT 1
- proposal(op): new server interface to replace storage HOT 8
- state always returned in access token response HOT 2
- JWT Assertion payload does not match RFC example when generated with OIDC relying party HOT 8
- [Bug]: Client Assertion token request includes basic auth header HOT 3
- PKCE support is not enough HOT 1
- use trace id of external service HOT 2
- Allow custom forwarded header HOT 2
- [Bug]: client invalid signature when OIDC server is restarted HOT 2
- The automated release is failing π¨
- [Bug]: nil pointer dereference in `crypto.BytesToPrivateKey` HOT 3
- Access to auto discovery configuration HOT 3
- Allow empty nonce from ID Tokens issued from Refresh Tokens HOT 10
- Support form_post OIDC response mode HOT 4
- Do not ignore all JWKS parsing errors HOT 1
- [Bug]: nil pointer dereference when not setting unauthorized handler HOT 2
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
π Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. πππ
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google β€οΈ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from oidc.