You are viewing a plain text version of this content. The canonical link for it is here.
Posted to server-dev@james.apache.org by "Benoit Tellier (Jira)" <se...@james.apache.org> on 2022/04/27 03:55:00 UTC
[jira] [Created] (JAMES-3755) IMAP OIDC: optional configuration of a token_instrospection endpoint
Benoit Tellier created JAMES-3755:
-------------------------------------
Summary: IMAP OIDC: optional configuration of a token_instrospection endpoint
Key: JAMES-3755
URL: https://issues.apache.org/jira/browse/JAMES-3755
Project: James Server
Issue Type: Improvement
Components: IMAPServer, SMTPServer
Affects Versions: 3.7.0
Reporter: Benoit Tellier
Fix For: 3.8.0
Today upon receiving a OIDC auth request James verifies the signature against a configured JWKS endpoint to validate the token.
This decentralized design do not account for revocation.
Several solution to this problem exists:
- Calling the OIDC provider introspection endpoint to validate the token
- Or having a set of invalidated token maintained by the application, this needs to be updated by a backchannel from the OIDC provider.
While my favor tend to go to the second one, the first one is rather common to.
To give an exemple, one of my customers is required to implement the first approach: calling the introspection endpoint.
h3. Proposed solution
- Optional configurable endpoint for checking token validity
- If specified this endpoint will be called to validate OIDC tokens
The call can be performed using a reactor-netty HTTP client.
h3. References
- https://datatracker.ietf.org/doc/html/rfc7662 RFC-7662 OAuth 2.0 Token Introspection
--
This message was sent by Atlassian Jira
(v8.20.7#820007)
---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscribe@james.apache.org
For additional commands, e-mail: server-dev-help@james.apache.org