-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SL1 - are access tokens part of SL1? #63
Comments
having thought about this overnight, I think that access tokens should NOT be part SL1 |
Should not at all or should not be required? IOW, you're suggesting that only OIDC implicit grant type be used? |
I think the As OIDC is built on OAuth 2.0, and OAuth 2.0 requires an To simplify compliance, I propose that IPSIE specifies that the userinfo endpoint is not supported and that an The user_info endpoint is used at times to return all the groups a user belongs to. This falls into the identity lifecycle dimension of IPSIE which is a different conversation. |
I meant with form post, but yea, I guess code flow works too (as the id_token comes on the backchannel).
I don't see anything that we don't expect claims to be delivered via the id_token. So then not allowing the userinfo endpoint makes state management in the RP with the id_token a potential problem (for use at logout time) if there are lots of claims. I've seen large cloud enterprise token servers have 200+ roles/groups delivered to the RP (for better or for worse). |
+1 to For interoperability with the existing ecosystem of RPs and toolkits, I was thinking IPSIE SL1 does not support the IPSIE would also specify that the UserInfo |
Only allow, or requires at a minimum? I see custom scopes (often in favor other than profile, email, etc) all the time in OIDC to model a variety of enterprise types of identity data. |
I'm aligned on Karl's suggestion. @mcguinness 5 minutes seems like a long time for an I also think other "scopes" should be allowed, but only identity related scopes that would translate into claims, not scopes that provide access to resources with the access_token. |
Well, I was more asking around the use of custom scopes and/or the claims param to request additional user claims (beyond those of profile, et al) in the id_token (or from userinfo). So not other resource server endpoints, as it were.
Yes, this is what I was trying to get at. So +1. |
I'm good with @dickhardt take that if they are identity related scopes that release claims in |
Why does SL1 need to specify an access token? While they are used for userinfo calls -- it is generally a one time use. I think we need to clarify what else besides userinfo we would need.
Building on that, it would seem access tokens for other resources that may be at the identity service to be out of scope.
How an RP manages its own 1P access / refresh tokens is also important, but I think independent of session lifecycle with the exception that the RP should be able kill refresh tokens.
The text was updated successfully, but these errors were encountered: