-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Allow Token Introspection to be customized #493
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks for the report @zf1976. At the moment, the Token Introspection endpoint cannot be customized. We will look at adding this support soon. In the meantime, the JWT received by the Resource Server should be able to parse the claims and authorize on the |
Thanks for your advice. |
@zf1976 Just confirming that you no longer need this customization capability since you closed the issue? |
I needed to introspect the endpoint to verify whether the token was revoked, and based on the above problem, I found a solution to manually parse to obtain the AUTHORITIES attribute |
I want the endpoint to be able to return custom attributes |
@zf1976
Reopening and will look at adding this capability soon. |
It's too long to wait for version 0.2.3. Can you advance it? thanks! |
+1 |
Hi @jgrandja . |
The issue is yours @Erised. Thanks! |
Hi @jgrandja. I think putting authorities in claims in straightforward. They can be pulled from available Or, content of OAuth2TokenIntrospection#withActiveTokenClaims be extracted into a claims mapping strategy that can be configured via |
Hi @Erised
We need the capability to customize the default claims initialized by Take a look at |
How to customize the introspection endpoint using OAuth2TokenIntrospectionEndpointConfigurer? The documentation only shows how to customize the userinfo endpoint. |
The text was updated successfully, but these errors were encountered: