-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Allow configuring custom validator for Jwt client assertion #643
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks for the request @atjohn-csam. We'll look at adding this customization hook. |
Hi @jgrandja Can I work on this feature? I am thinking of introducing DefaultJwtAssetionValidatorFactory to JwtClientAssertionAuthenticationProvider which will have the set of existing validators (new JwtClaimValidator<>(JwtClaimNames.ISS, clientId::equals), |
Thanks for your interest @atjohn-csam. We're holding off on adding new features and enhancements until after we release Our top priority for Please reach out again after |
Related gh-897 |
@atjohn-csam This is now resolved via gh-944. Please see comment. Closing this as a duplicate. |
Expected Behavior
It would be great if we could add a custom claim validator for client authentication using JWT assertion. This will allow additional validations to be done on the jwt assertion authentication.
Current Behavior
Right now for client authentication using JWT Assertion, DelegatingOAuth2TokenValidator comes with the default validators: return new DelegatingOAuth2TokenValidator<>(
new JwtClaimValidator<>(JwtClaimNames.ISS, clientId::equals),
new JwtClaimValidator<>(JwtClaimNames.SUB, clientId::equals),
new JwtClaimValidator<>(JwtClaimNames.AUD, containsProviderAudience()),
new JwtClaimValidator<>(JwtClaimNames.EXP, Objects::nonNull),
new JwtTimestampValidator()
Context
In this implementation, the clients will send JWT assertions with custom claims which I am planning to validate before issuing the access token. I haven't found away to configure this.
The text was updated successfully, but these errors were encountered: