Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for tokens issued by OIDC v2.0 of the Azure AD #7

Open
miroag opened this issue Feb 21, 2024 · 2 comments · May be fixed by #11
Open

Support for tokens issued by OIDC v2.0 of the Azure AD #7

miroag opened this issue Feb 21, 2024 · 2 comments · May be fixed by #11

Comments

@miroag
Copy link

miroag commented Feb 21, 2024

Azure AD supports two versions of the OIDC. v2.0 has been available since 2019 and, in general, recommended by MS. Both versions are still supported.
The problem is that this library only supports v1.0. I do not know all the details, but from a validation perspective, the only difference is where to get the well_known config.
For v1.0 it's https://login.microsoftonline.com/{{tenant}}/.well-known/openid-configuration
Where for the v2.0 it's https://login.microsoftonline.com/{{tenant}}/v2.0/.well-known/openid-configuration

It would look like the public certificates did not change, but there are differences in the issuers:

Hence, validation of the token would fail if the token is issued by the OIDC v2.0.

I've prepared the change if you are interested, but cannot push the branch.

@siunhanvjp
Copy link

Hi @miroag ,

I'm experiencing the same problem you described regarding Azure AD's OIDC versions. Could you please share the solution you prepared? It would be really helpful.

Thanks in advance!

@miroag
Copy link
Author

miroag commented May 23, 2024

Hi @siunhanvjp
In the end, I used another library that was better suited to my needs. Anyway, I found the code I did back then and opened the PR linked above.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants