Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: support unsigned ID tokens even when JOSE disables them #295

Merged
merged 1 commit into from
Nov 27, 2023

Conversation

paulswartz
Copy link
Collaborator

By default, JOSE disables verification of none alg JWTs, for (reasonable) security preferences. However,
oidcc-client-test-idtoken-sig-none says this is an optionally supported use case. This updates the implementation of verify_signature to return an error with the JWT/JWS values even when JOSE is configured not to allow none signatures.

By default, JOSE disables verification of `none` alg JWTs,
for (reasonable) security preferences. However,
`oidcc-client-test-idtoken-sig-none` says this is an optionally
supported use case. This updates the implementation of
`verify_signature` to return an error with the JWT/JWS values even when
JOSE is configured not to allow `none` signatures.
@maennchen maennchen merged commit 79302ea into erlef:main Nov 27, 2023
25 checks passed
@maennchen maennchen added this to the v3.1.0 milestone Nov 29, 2023
@maennchen maennchen self-assigned this Nov 29, 2023
@paulswartz paulswartz deleted the verify-none branch January 13, 2024 01:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants