Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

[Security] Import oidc.signature.key JWK from OIDC server #50434

Copy link
Copy link
Closed
@vincentchalamon

Description

@vincentchalamon
Issue body actions

Description

On OIDC (experimental) feature, the JWK must be set in the configuration (e.g.: key: %env(OIDC_JWK)%). This JWK is generated on the OIDC server. If it changes on it, its value must be updated on the Symfony project.

To access it, most OIDC servers implement a /protocol/openid-connect/certs URI exposing public JWKs used to encrypt JWTs and sign them. I suggest to import this JWK from this URI dynamically, and save it locally to prevent any extra HTTP request (app cache?).

Question: should it be a new feature or a bugfix?

Example

Current implementation:

security:
  firewalls:
    main:
      oidc:
        signature:
          key: '{"kid": "...","kty": "RSA","alg": "RS256","use": "sig","n": "3G..."}'

Proposals:

security:
  firewalls:
    main:
      oidc:
        signature:
          # proposal 1: detect value is an URI, call it to import the JWK
          key: 'https://www.example.com/protocol/openid-connect/certs'
          # proposal 2: add new option "certs" non combinable with "key" to import and set "key" option dynamically
          certs: 'https://www.example.com/protocol/openid-connect/certs'

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions

      Morty Proxy This is a proxified and sanitized view of the page, visit original site.