Description
Describe the bug
Already discussed here #1116 (comment). Creating a separate issue as it never got traction and now it became a blocker for us to continue adoption.
Device Code flow ignores openid
scope, never generates an ID token and doesn't provide it in the token response. This doesn't let headless applications (e.g. desktop applications or CLIs) to authenticate a user and personalize experience.
As a side effect, if refresh token is also present then refresh will fail with NullPointerException
in
To Reproduce
Go through device code flow with openid
scope.
Expected behavior
Token response for Device Code flow is the same as for Authorization Code flow when given same scopes.
Ideally, any flow which involves a user should support openid
scope and provide an ID token in the token response.
See references:
- https://auth0.com/docs/get-started/authentication-and-authorization-flow/call-your-api-using-the-device-authorization-flow#receive-tokens
- https://developer.okta.com/docs/guides/device-authorization-grant/main/#request-access-id-and-refresh-tokens
- https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-device-code#successful-authentication-response