Conversation
| let user = {} as TUser | ||
|
|
||
| // some OIDC providers do not support a userinfo endpoint so we only call it when its defined inside the OIDC config | ||
| if (oidcConfig.userinfo_endpoint) { |
There was a problem hiding this comment.
Since not all OIDC providers support the /userinfo endpoint, this should probably be inferred from the ID Token IF it is verified?
|
Hey, one question regarding the aim of this PR: Example: You login via GitHub and get the tokens in the response from GitHub. With the changes in this PR, we would immediately verify / ask GitHub again "Are these tokens valid?" |
|
Hi @larsrickert, the purpose is to independently verify the signature of the JWT using the provider's public key. As it stands now, this will only verify the signature IF there is JWKS defined in the FYI: This PR is not complete, and i am looking for input so any suggestions are more than welcome ❤️ Edit: This should probably be an opt-in feature |
This PR aims to add support for using JWKS to verify the token if provided in config or OIDC endpoint..