-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client authentication failed due to password contains character "+" #1622
Comments
You need to url-encode the secret/id
…> On 30. Oct 2019, at 07:59, rickwang7712 ***@***.***> wrote:
Describe the bug
A clear and concise description of what the bug is.
Setting string like "6eYJ+6eYJ" will cause Client Authentication failed.
related log:
{"debug":"crypto/bcrypt: hashedPassword is not the hash of the given password","description":"Client authentication failed (e.g., unknown client, no client authentication included, or unsupported authentication method)","error":"invalid_client","level":"error","msg":"An error occurred","time":"2019-10-30T06:34:05Z"}
Reproducing the bug
Steps to reproduce the behavior:
Response: {"error":"invalid_client","error_description":"Client authentication failed (e.g., unknown client, no client authentication included, or unsupported authentication method)","status
_code":401}
Server configuration
Expected behavior
The password should support any character which can be typed on the keyboard.
Environment
Version: v1.0.8+oryOS.12
Git Hash: f60c724
Build Time: 2019-10-04T07:10:20Z
Environment: Docker
Additional context
I also tried secret with character "/", which will pass the secret check instead.
If there is any restriction about cliect_secret, I think it should be described in the table below List OAuth 2.0 Clients.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
ahh...ok.... Thank you for your reply.
|
Most likely, that's why we always encourage using standard libraries to interact with OAuth2 everywhere. It's simply the way HTTP Basic Authentication is defined in the context of OAuth2. |
Sorry to bother, I would like to clarify more things. I was saying that I use Postman to send admin api for creating/updating client. Is there also a standard library or tool to interact with hydra’s admin endpoint? Thanks!
|
golang/oauth2 is a good choice for interacting with oauth2. so special client is needed for admin apis
… On 30. Oct 2019, at 14:39, rickwang7712 ***@***.***> wrote:
Sorry to bother, I would like to clarify more things.
I was saying that I use Postman to send admin api for creating/updating client.
On the client side, I use golang/oauth2 library to send api to public endpoint.
Is there also a standard library or tool to interact with hydra’s admin endpoint?
Or should I not using golang’s oauth2 library on the client side?
Thanks!
Maybe it's because I use Postman in a wrong way? I use raw JSON to send body data('6eYJ+6eYJ').
Most likely, that's why we always encourage using standard libraries to interact with OAuth2 everywhere. It's simply the way HTTP Basic Authentication is defined in the context of OAuth2.
—
You are receiving this because you modified the open/close state.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
Describe the bug
A clear and concise description of what the bug is.
Setting string like "6eYJ+6eYJ" as client_secret will cause "Client Authentication failed".
Reproducing the bug
Steps to reproduce the behavior:
"client_id": "webportal",
"client_secret": "6eYJ+6eYJ",
"post_logout_redirect_uris": ["https://demo.dev.com"],
"redirect_uris": ["https://demo.dev.com", "https://demo.dev.com/login"],
"scope": "openid userinfo",
"token_endpoint_auth_method": "client_secret_post",
"response_types": ["code","id_token"],
"grant_types": ["authorization_code"],
"backchannel_logout_session_required": true,
"backchannel_logout_uri": "https://demo.dev.com:8443/internal/v1/backchannel_logout"
{"some": "error"}
Response: {"error":"invalid_client","error_description":"Client authentication failed (e.g., unknown client, no client authentication included, or unsupported authentication method)","status
_code":401}
Server configuration
Expected behavior
The password should support any character which can be typed on the keyboard.
Environment
Version: v1.0.8+oryOS.12
Git Hash: f60c724
Build Time: 2019-10-04T07:10:20Z
Environment: Docker
Additional context
I also tried secret with character "/", which will pass the secret check instead.
If there is any restriction about cliect_secret, I think it should be described in the table below List OAuth 2.0 Clients.
The text was updated successfully, but these errors were encountered: