Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport: Add response_types_supported to OIDC configuration (#7533) #7552

Merged
merged 1 commit into from
Oct 7, 2019

Conversation

kalafut
Copy link
Contributor

@kalafut kalafut commented Oct 2, 2019

Backport of: #7533

The OIDC Discovery standard requires the response_types_supported field
to be returned in the .well-known/openid-configuration response.

Also, the AWS IAM OIDC consumer won't accept Vault as an identity
provider without this field.

Based on examples in the OIDC Core documentation, it appears Vault
supports only the id_token flow, and thus that is the only value that
makes sense to be set in this field. See:

https://openid.net/specs/openid-connect-core-1_0.html#AuthorizationExamples

The OIDC Discovery standard requires the response_types_supported field
to be returned in the .well-known/openid-configuration response.

Also, the AWS IAM OIDC consumer won't accept Vault as an identity
provider without this field.

Based on examples in the OIDC Core documentation, it appears Vault
supports only the `id_token` flow, and thus that is the only value that
makes sense to be set in this field. See:

https://openid.net/specs/openid-connect-core-1_0.html#AuthorizationExamples
@kalafut kalafut changed the title Add response_types_supported to OIDC configuration (#7533) Backport: Add response_types_supported to OIDC configuration (#7533) Oct 2, 2019
@kalafut kalafut added this to the 1.2.4 milestone Oct 2, 2019
@chrishoffman
Copy link
Contributor

Can you add a link to the PR in master?

@kalafut kalafut merged commit 3982d9f into release/1.2.x Oct 7, 2019
@kalafut kalafut deleted the backport-oidc-resp-types branch October 7, 2019 17:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants