-
Notifications
You must be signed in to change notification settings - Fork 6k
Add support for OAuth 2.0 Client authentication methods #6881
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@beuvenar We definitely plan on adding support for other client authentication methods at some point and dependent on user demand. I'm not sure it will get into the next release 5.2. Is there a reason you are requesting |
@jgrandja We are currently using Srping Security to implement an integration with OIDC provider of EU Login (formerly ECAS), the authentication service of European Commission. They recommend to use client_secret_jwt or private_key_jwt as authentication methods (but they also support basic method so we are not blocked). |
Hi @jgrandja , is there an ETA on this? Which classes should I be looking at to introduce this? |
We also need private_key_jwt as a client authentication method in order to implement an integration to the Norwegian ID-porten. We are forced to change client secret often unless we are using private_key_jwt, so I'm looking forward to the 5.3 release. |
@phughk Our goal is to provide The first place to look at is You can also check out the reference doc. Let me know if you have any other questions. |
@jgrandja is there any alternative for Is it instead expected that we add an All I want to do is add an extra scope (in addition to the ones already on the |
Yes, this is the approach for the reactive side. You can either start with |
@jgrandja I previously tried that approach, but I hit a blocker. Unlike the request entity Apologies if this is polluting this issue, I'm happy to move the conversation elsewhere. |
Hey, |
You can provide your own implementation of
Now you can lookup If you have further questions, please log a new ticket so we can continue on there. |
@jgrandja is there interest in the idea of adding the |
@zpearce I'm not sure I follow you? Can you please provide more detail. As well, if this is not related to this issue please log a new issue and we can continue the convo there. |
@krajcsovszkig-ms I haven't heard from @Budlee in a while and @forgo just submitted a PR #8445. Can you take a look at the PR first and maybe provide feedback there? |
Huh, not sure how I didn't notice the latest comments. I'm happy to get involved with the review and testing, and also to help with the implementation if I can. |
Thanks @krajcsovszkig-ms. It would be great if you can take a look at #8445 to provide feedback and share your design ideas. The more eyes on it the better the design outcome will be. |
Hi @jgrandja, We are having a discussion about the design over on the PR, could you take a look and add your comments? Thanks! |
Sure @krajcsovszkig-ms. I will get to it this week for sure. |
Great, thanks @jgrandja |
Hey there, I also have the requirement for private_key_jwt client authentication method etc.....any idea of the progress of this feature. I'll probably have to implement something custom for my project, but I was just curious. Thank you |
@brandon3123 We are currently working on this but it will be tight to get this into 5.4 since it's being released in Sep. If it doesn't get into 5.4, it will get into next release for sure. |
Hi, great you are working on this. If not could you also include this optionally? |
@sander-su Our goal is to implement to spec. With non-standard features, we typically provide hooks to allow for customizations. Please keep track of this issue and feature development to let me know if you require any additional hooks for your requirements with Azure AD. |
@jgrandja Thanks for looking into this. Furthermore, is it in the design to add a JTI to the jwt? Btw which issue is best to comment, this one or #6053? |
@sander-su This is the right issue to comment on. When work starts on this feature, we'll consider your feedback. |
@jgrandja Thanks for looking into this, I really appreciate it! I was just wondering if there is any progress on the private_key_jwt authentication method. Many of our customers would like to use the spring security module, however, we as operators of an OP would prefer to enforce the use of keys over passwords. |
@beuvenar @phughk @erlendfg @Budlee @forgo @krajcsovszkig-ms @brandon3123 @sander-su @schluemi @mjeffrey @matt-domsch-sp Please see #9520. It would be greatly appreciated if you can test out the initial implementation with the provider(s) you are using. FYI, I need to get this merged before April 12 for |
Thanks @jgrandja for doing this and sorry for not helping more in the end, something more urgent came up and took pretty long to clean up. I've reviewed your PR and it looks great, I'm pretty sure it should work for us. I'm unfortunately unable to build spring-security inside our organization to try your PR (I assume it's something with the way our proxies and firewalls are set up). Would it be possible to make a snapshot of it available on maven or some other public repository? We have a process to pull those in but I can't just build it outside and send the jars in I'm afraid. Thanks! |
Unfortunately no. It's available on http://repo.spring.io/ until it goes GA and then it will be available in Central. |
@jgrandja, I know its a bit late, however, I have gone over the PR and could not see any issues, Looks great |
Currently, Spring Security only supports basic and post authentication methods between client and authorization server. Would it be possible to add other support for other OpenID authentication methods in a future version of Spring Security, in particular client_secret_jwt and private_key_jwt (see https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication)?
Related #8175
The text was updated successfully, but these errors were encountered: