You are viewing a plain text version of this content. The canonical link for it is here.
Posted to server-dev@james.apache.org by "Benoit Tellier (Jira)" <se...@james.apache.org> on 2022/04/27 03:55:00 UTC

[jira] [Created] (JAMES-3755) IMAP OIDC: optional configuration of a token_instrospection endpoint

Benoit Tellier created JAMES-3755:
-------------------------------------

             Summary: IMAP OIDC: optional configuration of a token_instrospection endpoint
                 Key: JAMES-3755
                 URL: https://issues.apache.org/jira/browse/JAMES-3755
             Project: James Server
          Issue Type: Improvement
          Components: IMAPServer, SMTPServer
    Affects Versions: 3.7.0
            Reporter: Benoit Tellier
             Fix For: 3.8.0


Today upon receiving a OIDC auth request James verifies the signature against a configured JWKS endpoint to validate the token.

This decentralized design do not account for revocation.

Several solution to this problem exists:

 - Calling the OIDC provider introspection endpoint to validate the token
 - Or having a set of invalidated token maintained by the application, this needs to be updated by a backchannel from the OIDC provider.

While my favor tend to go to the second one, the first one is rather common to.

To give an exemple, one of my customers is required to implement the first approach: calling the introspection endpoint.

h3. Proposed solution

 - Optional configurable endpoint for checking token validity
 - If specified this endpoint will be called to validate OIDC tokens

The call can be performed using a reactor-netty HTTP client.

h3. References

 - https://datatracker.ietf.org/doc/html/rfc7662 RFC-7662 OAuth 2.0 Token Introspection



--
This message was sent by Atlassian Jira
(v8.20.7#820007)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscribe@james.apache.org
For additional commands, e-mail: server-dev-help@james.apache.org