Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork9.7k
[Security] Support RSA algorithm signature for OIDC tokens#53682
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Uh oh!
There was an error while loading.Please reload this page.
Conversation
bc94265 to9c46285Compare...ony/Bundle/SecurityBundle/DependencyInjection/Security/Factory/SignatureAlgorithmFactory.php OutdatedShow resolvedHide resolved
Uh oh!
There was an error while loading.Please reload this page.
Uh oh!
There was an error while loading.Please reload this page.
84e1317 to6b4e728CompareSpomky commentedFeb 1, 2024
Hi, Is it possible to put this PR on hold? |
Spomky commentedFeb 1, 2024 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
Can you test with Also, because the new Note: |
45ddac6 to2a7b316Comparelouismariegaborit commentedFeb 1, 2024 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
Hi@Spomky This seems ok. I removed also I will look so that developers picked the algorithms they need. I will update the PR title when we validate the work. |
2a7b316 tod9c3714Comparelouismariegaborit commentedFeb 1, 2024
@Spomky I did a try. WDYT ? |
Spomky commentedFeb 2, 2024 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
Indeed, most of @vincentchalamon do you have any recommendation to have a better algorithm support architecture. # config/packages/security.yamlsecurity:firewalls:main:access_token:token_handler:oidc:# Algorithms used to sign the JWSalgorithms: -'ES256' -'RS256' -'PS256'# A JSON-encoded JWKkey:'{"kty":"...","k":"..."}' From my understanding, it will require:
Any ideas on this? |
louismariegaborit commentedFeb 2, 2024
@Spomky I started this work in another PR (#51665). |
vincentchalamon commentedFeb 2, 2024
@Spomky on an OIDC server (e.g.: Keycloak), is it possible to allow multiple algorithms on a single realm? If true, multiple algorithms configuration could be interesting, indeed. I'm just wondering if the If false, I don't think we should allow multiple algorithms configuration as multiple realms are not supported. |
...ony/Bundle/SecurityBundle/DependencyInjection/Security/Factory/SignatureAlgorithmFactory.php OutdatedShow resolvedHide resolved
Uh oh!
There was an error while loading.Please reload this page.
...y/Bundle/SecurityBundle/DependencyInjection/Security/AccessToken/OidcTokenHandlerFactory.php OutdatedShow resolvedHide resolved
Uh oh!
There was an error while loading.Please reload this page.
nicolas-grekas left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
LGTM with minor CS fixes
chalasr left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
Can you look at failing tests?
949281a tod930172CompareSpomky commentedMar 24, 2024
Hi@chalasr, It seems to be fine now. |
chalasr commentedApr 3, 2024 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
Thank you@louismariegaborit and@Spomky. |
Add support for RSA signature algorithm for OidcTokenHandler.
Amazon Cognito uses RS256 algorithm for its tokens.