-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Implement OpenID Connect 1.0 Client Registration Endpoint #57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@ovidiupopa91 Regarding timing for this feature, there is no rush to complete. But I'm thinking late Jan or sometime in Feb would be nice but again not a priority. I'll provide detailed requirements in this issue sometime tomorrow and then I can answer any questions you have on Gitter. I can be on Gitter Friday morning anytime between 9am-12pm EST, if that timing works for you? |
@jgrandja great. I will go through the requirements and I will contact you on Gitter (during that time frame) if I have any questions. |
Hi @jgrandja . No questions from my side. Enjoy your days off! |
Excellent @ovidiupopa91 . Enjoy your time off too and we'll chat in the new year ! |
This issue will deliver the Client Registration Endpoint, which is defined in OpenID Connect Dynamic Client Registration 1.0.
NOTE: This issue should NOT implement the Client Configuration Endpoint - it MAY be implemented in a separate PR at a later point.
The Client Registration Endpoint should follow a similar implementation pattern as the Provider Configuration Endpoint gh-55.
At a minimum, the following artifacts should be produced:
OidcClientRegistrationEndpointFilter
(referenceOidcProviderConfigurationEndpointFilter
)OidcClientRegistration
(referenceOidcProviderConfiguration
)OidcClientMetadataClaimAccessor
(referenceOidcProviderMetadataClaimAccessor
)OidcClientMetadataClaimNames
(referenceOidcProviderMetadataClaimNames
)OidcClientRegistrationHttpMessageConverter
(referenceOidcProviderConfigurationHttpMessageConverter
)The
OidcClientMetadataClaimAccessor
should only implement the REQUIRED claims and may implement the OPTIONAL claims if it's applicable to a feature that is currently implemented.Take note of Section 3. Client Registration Endpoint:
Initial Access Token Requirements
client_credentials
grant.client.create
and no other additional scopes.OAuth2AuthorizationCode
(authorization_code
grant) with a time-to-live of 5 mins and can only be used once.client.create
scope, therefore, we need to leverage/integrateHttpSecurity.oauth2ResourceServer().jwt()
.The text was updated successfully, but these errors were encountered: