-
-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introspection endpoint is not discovered #141
Comments
I see from search results that some OIDC providers define an However, users of this crate can add arbitrary fields to Here's an example: openidconnect-rs/examples/google.rs Lines 49 to 73 in d796cca
|
Hi @ramosbugs . Thanks for the explanation. I was fooled by the fact that oauth2's Client declares You are completely right about the standards, I assumed that everything that the I see that there is RFC 8414, but it's a Proposed Standard. Thank you very much for pointing me to the example, which demonstrates clearly how I can move forward. Feel free to close the issue. |
Oh, this may be sufficient justification to include it! The introspection, revocation, and device authorization grant RFCs are all Proposed Standards as well. I'll take a closer look and follow up. |
I've looked over RFC 8414, and I'm a little hesitant to mix fields from this newer OAuth2 standard with the fields from the original OIDC Discovery standard. It's possible that some OpenID Connect providers will add their own fields that conflict with this RFC 8414, but that are still compatible with OIDC Discovery (which permits arbitrary additional fields to be added). I think the simplest solution for now would be to add an example to the crate (similar to the Google one for the revocation endpoint) that illustrates how to use I'm also trying to figure out how to make this interact cleanly with the new typestates approach from |
@ramosbugs It looks like the device authorization grant workflow has been fully approved by RFC 8628, it also adds the appropriate discovery document section and request parameters, see RFC 8628, Section 7. |
Unfortunately, this refers to the RFC 8414 OAuth 2.0 Authorization Server Metadata, not the OpenID Connect Discovery metadata. That's an entirely different discovery protocol not supported by this crate. |
@ramosbugs Thank you for your feedback and you are absolutely right. I was too excited to see it being finalized a while back and missed that crucial part. Guess I will go back to wait for the spec to be finally integrated into the Discovery metadata. |
During discovery, the introspection endpoint is discarded. Apparently it is not implemented in
ProviderMetadata.
The text was updated successfully, but these errors were encountered: