Skip to content

Support for JWT Header TYP as "at+jwt" #13185

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
ymajoros opened this issue May 16, 2023 · 4 comments
Closed

Support for JWT Header TYP as "at+jwt" #13185

ymajoros opened this issue May 16, 2023 · 4 comments
Assignees
Labels
in: oauth2 An issue in OAuth2 modules (oauth2-core, oauth2-client, oauth2-resource-server, oauth2-jose) status: duplicate A duplicate of another issue type: enhancement A general enhancement

Comments

@ymajoros
Copy link

This is a follow-up issue:

Expected Behavior
Currently, if the JWT is having typ as "at+jwt", the token is rejected with message "Failed to authenticate since the JWT was invalid". Spring Security Oauth2 Resource Server with JWT as bearer token should accept typ as "at+jwt" as well.

Current Behavior
Currently, if the JWT is having typ as "at+jwt", the token is rejected with message "Failed to authenticate since the JWT was invalid".

My Authorization server is issuing JWT access token with typ as "at+jwt" as per the following draft:
https://www.rfc-editor.org/rfc/rfc9068.html

How has this issue affected you?
JWT token is rejected although this is correct as per Authorization server

What are you trying to accomplish?
Validate JWT Bearer token using Spring Security OAuth2 Resource Server capabilities.

What other alternatives have you considered?
Ugly workaround (custom JWT decoder).

Are you aware of any workarounds?
Custom JWT decoder (quite cumbersome).

@ymajoros ymajoros added status: waiting-for-triage An issue we've not yet triaged type: bug A general bug labels May 16, 2023
@ymajoros
Copy link
Author

@ymajoros
Copy link
Author

Pull request: #13186

@jzheaux
Copy link
Contributor

jzheaux commented May 19, 2023

Thanks, @ymajoros. I'm closing this in favor of reopening #9900. Please see #9900 (comment) for details.

@jzheaux jzheaux closed this as completed May 19, 2023
@jzheaux jzheaux self-assigned this May 19, 2023
@jzheaux jzheaux added status: duplicate A duplicate of another issue type: enhancement A general enhancement in: oauth2 An issue in OAuth2 modules (oauth2-core, oauth2-client, oauth2-resource-server, oauth2-jose) and removed status: waiting-for-triage An issue we've not yet triaged type: bug A general bug labels May 19, 2023
@ymajoros
Copy link
Author

Thanks, let's go further in #9900 but please note that there was a pull request attached.

jzheaux added a commit to ymajoros/spring-security that referenced this issue Feb 27, 2025
jzheaux added a commit to ymajoros/spring-security that referenced this issue Feb 27, 2025
jzheaux added a commit that referenced this issue Feb 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
in: oauth2 An issue in OAuth2 modules (oauth2-core, oauth2-client, oauth2-resource-server, oauth2-jose) status: duplicate A duplicate of another issue type: enhancement A general enhancement
Projects
None yet
Development

No branches or pull requests

2 participants