-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Data Passthrough to IDP #431
Comments
https://ory.gitbooks.io/hydra/content/oauth2.html#consent-app-flow There are fields |
Hi @arekkas - thanks. Pardon me if I am incorrect, but I believe that those are fields (id_ext, and at_ext) are added by the IDP when replying back to Hydra after consent is given by the user. I am trying to get data passed through the /oauth2/auth call to the /consent call.
The second call there is what I would like to receive that extra information. It may be in the challenge token, or maybe in the /consent query parameters. |
@arekkas any ideas? Thanks |
Sorry for my inresponsiveness, it was a really stressful week. Ah I see, I misunderstood. Simply add the things you want in the IDP to the oauth2 url Hope that helps. |
I'm sorry your week has been tough. :( Here's to better days 🥂 Your solution fits things perfectly. Thank you very much! |
That cheered me up! :) Glad to be of help! |
I landed on this issue with the same need as the author, but the solution described here doesn't work as of v1.0.0-beta.9. Is this behavior now deprecated? The extra query fields I added to the auth URL to Hydra do not get passed to the /login IDP login redirect. To achieve the same effect, I had to depend on the URL returned as part of getLoginReq call:
Is this the new/correct approach? Happy to make a PR to the docs/guide if so. |
Yeah, this has actually come up in another question in the forum. I think we can add the original URL as part of the request payload, otherwise you'll have to first accept the login in order to get the URL. Please create a new issue to track this and feel free to create a PR! |
Hi @aeneasr @impactmass
could you please help me to send the link about this? I am using hydra v1.5.0 and also got this:
hydra does not redirect to IDP |
Hello, I found the |
When you check fetch the e.g. the login challenge ( |
I'm working on implementing an IDP which works with Hydra.
During login in the IDP we need to know a few pieces of information. And in many cases that information could be determined via a vanity URL.
an example would be an AWS login url.
123123123123.login.amazonaws.com
The login page pre-fills the account-id in for you, based on the domain.
In the same vein, I would like to have vanity URLs pass extra information to the
/oauth2/auth
endpoint, which then gets sent through to the IDP/consent
call.I thought a simple and flexible approach might be to add to the JWT token
hydra/oauth2/consent_strategy.go
Line 131 in 868a02b
a field called
auth_url
which contains the /oauth2/auth path in it's entirety (maybe this is a security hole?) The IDP could parse that out as it saw fit.Another idea would be to pass along a special query parameter from /oauth2/auth.
auth_extra
or some such. One could put b64 data in there just as easily.I'm more than happy to implement any of these solutions that would solve this problem.
Thoughts?
The text was updated successfully, but these errors were encountered: