-
Notifications
You must be signed in to change notification settings - Fork 6k
Potential incoherent issue and expiry instants in Oauth2 tokens #6807
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Closing - see comments in #6808 |
I understand you don't want to introduce breaking changes at this stage. Few remarks on the working branch I linked to this ticket:
|
On a purely theoretical point of vue, I'm always puzzled when I have more than a single representation of a value in an app. Here we have two different representations for issue and expiration dates in the same classes: one as IMO this is a design smell. One of the two should be removed and I think it's "members". To prevent breaking changes, it's possible to (just a suggestion):
|
@ch4mpy As already mentioned in this comment
If you look at the hierarchy of
To re-iterate, there is no concept of claims in the standard OAuth 2.0 Authorization Framework. The claims concept is introduced in extension specifications like OpenID Connect 1.0, Jwt (and JOSE framework specs), Token Introspection, etc. Promoting a |
@jgrandja please refer to the ticket title. My motivation to open it was "Potential incoherent issue and expiry instants in Oauth2 tokens". Not promote claims / attributes as @jzheaux as this ticket is originated from one of our discussions (when removing consistency check while building unit-test Jwt), please help me clarify the need. I'll try to make very short & easy to reference assertions I base my understanding on. This might help figure out where I'm going wrong. Please correct, complete or further break down:
As a side note, other assertions which could lead to additional OAuth2 token / authorization design modifications, but are out of scope of this ticket |
As pointed in #6634 (and #6557), it seems possible to build tokens with issue and expiry instants and differing with what is exposed in claims (or attributes for opaque tokens).
I propose here a rather radical way to prevent this: removing issue and expiration instants members from
AbstractOAuth2Token
in favor of claims.I've no illusion this PR will be rejected at this stage, just a support for discussion.
The text was updated successfully, but these errors were encountered: