-
Notifications
You must be signed in to change notification settings - Fork 14
Consider the placement of gty
claim in JWT minted by Client Credentials Grant
#2886
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
We hit this issue as well with AWS. As per their OIDC identity provider docs:
This issue is a blocker for us using FusionAuth. Is there any current workaround? |
@jdanton-believer no current workaround, since the header is inaccessible to the lambda. This would require a product change, either to allow a lambda to modify the header or product work to remove/rework the Thanks for letting us know this is a blocker. |
@mooreds thank you for the quick response! I understand that the Given that, do you think it reasonable to offer a config in the "JWT" section of FusionAuth to disable non-standard headers? As there is little to no upside for most use cases and clear downside? |
@jdanton-believer I can't really speak to possible solutions and what is "reasonable" or not. This issue has been raised internally, but I am not sure where it stands. |
Uh oh!
There was an error while loading. Please reload this page.
Problem
Currently, we place the
gty
claim in the header when we generate a JWT. There may be some compatibility issues with certain services, which may expect that claim in the body.Solution
Offer customization with where this claim can be placed.
Additional context
https://inversoft.slack.com/archives/C073KRR5Q90/p1727289281655169?thread_ts=1727285806.208769&cid=C073KRR5Q90
Azure seems to take issue with this when building this type of integration
The following error message is generated
Of course, it is possible that this error message is related to a limitation of Azure with this service and not related to the placement of the
qty
header.Seemingly, in the competitive landscape, this claim is included in the body.
Additional notes
alg jku jwk kid x5u x5c x5t x5t#S256 typ cty crit
alg typ x5t x5t#S256 x5c kid use enc ctx nonce rh kdf_ver jku jwk x5u
Per https://www.rfc-editor.org/rfc/rfc7515.html#section-4.2
where
Collision-Resistant Name
is defined as:So it appears that the RFC 7515 guidance is that we should have either registered
gty
in the IANA registry or used a longer identifier that we controlled. But the recommendation isn't a requirement (a MUST. If some IdPs don't like this claim in the header, this doesn't seem to a be a collision concern, as much as it is "we don't expect to see this claim" issue.Related links:
Community guidelines
All issues filed in this repository must abide by the FusionAuth community guidelines.
How to vote
Please give us a thumbs up or thumbs down as a reaction to help us prioritize this feature. Feel free to comment if you have a particular need or comment on how this feature should work.
The text was updated successfully, but these errors were encountered: