Back to articles
OpenID Connect Discovery 1.0 Deep Dive: OP's "Self-Introduction" and Dynamic Configuration Retrieval
How-ToSecurity

OpenID Connect Discovery 1.0 Deep Dive: OP's "Self-Introduction" and Dynamic Configuration Retrieval

via Dev.tokt

Introduction You probably use OIDC (OpenID Connect) every day to integrate Google Login or authentication flows into your applications. When doing so, have you ever experienced just setting issuer: "https://accounts.google.com" in your library initialization code, and it automatically resolves the Authorization Endpoint, Token Endpoint, and even the location of the public keys (JWKS)? "Why does just providing the Issuer URL reveal all the endpoints?" "How can it follow public key (JWKS) rotation without any downtime?" "In the first place, how does it identify the provider to authenticate with from an email-like ID such as alice@example.com ?" The answer to these questions is OpenID Connect Discovery 1.0 . In the past OAuth 2.0 world, it was common for developers to read the documentation and manually configure (hardcode) the URLs of each endpoint (such as /authorize and /token ) of the Authorization Server into the client. However, this relies on client-side modifications whenever the

Continue reading on Dev.to

Opens in a new tab

Read Full Article
2 views

Related Articles