Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for verifying OIDC JWT claims with custom Jose4j Validator #39425

Closed
sberyozkin opened this issue Mar 14, 2024 · 1 comment · Fixed by #39793
Closed

Support for verifying OIDC JWT claims with custom Jose4j Validator #39425

sberyozkin opened this issue Mar 14, 2024 · 1 comment · Fixed by #39793

Comments

@sberyozkin
Copy link
Member

sberyozkin commented Mar 14, 2024

Description

Right now, as part of the JWT token validation process, apart from the signature check, various simple claims with expected configured values can be checked.

If the claims are complex (objects, arrays) or if the simple claim values are dynamic, then, either the custom HttpSecurityPolicy or SecurityIdentityAugmentor can help, but neither of these options is ideal, the former requires to configure matching paths, the latter's job is really to augment, and both options are available after the SecurityIdentity has been created.

Supporting custom Jose4j Validator will close this gap, they are run as part the Jose4j process, before SecurityIdentity is created. In fact we already register the one internally for the simple claims, but letting users customize it further would be useful

CC @calvernaz

Implementation ideas

OidcProvider checks with Arc if custom Jose4J validators are available and if yes, registers them all before requesting the token verification

@quarkus-bot
Copy link

quarkus-bot bot commented Mar 14, 2024

/cc @pedroigor (oidc)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants