-
Notifications
You must be signed in to change notification settings - Fork 200
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat! auth code flow #2088
base: main
Are you sure you want to change the base?
feat! auth code flow #2088
Commits on Aug 30, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 5cd08fe - Browse repository at this point
Copy the full SHA 5cd08feView commit details -
Configuration menu - View commit details
-
Copy full SHA for b64bce3 - Browse repository at this point
Copy the full SHA b64bce3View commit details
Commits on Oct 9, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 80b55b4 - Browse repository at this point
Copy the full SHA 80b55b4View commit details -
Configuration menu - View commit details
-
Copy full SHA for 9ccb645 - Browse repository at this point
Copy the full SHA 9ccb645View commit details -
Configuration menu - View commit details
-
Copy full SHA for 8ab5b22 - Browse repository at this point
Copy the full SHA 8ab5b22View commit details -
Configuration menu - View commit details
-
Copy full SHA for bd02008 - Browse repository at this point
Copy the full SHA bd02008View commit details -
fix: host separate oauth-auhtorization-server
Signed-off-by: Timo Glastra <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b2eb533 - Browse repository at this point
Copy the full SHA b2eb533View commit details
Commits on Oct 29, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 3de4e82 - Browse repository at this point
Copy the full SHA 3de4e82View commit details
Commits on Oct 30, 2024
-
Configuration menu - View commit details
-
Copy full SHA for c0b49dc - Browse repository at this point
Copy the full SHA c0b49dcView commit details
Commits on Nov 5, 2024
-
Configuration menu - View commit details
-
Copy full SHA for be9876b - Browse repository at this point
Copy the full SHA be9876bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 9e1050b - Browse repository at this point
Copy the full SHA 9e1050bView commit details
Commits on Nov 8, 2024
-
feat: working and tests passing
Signed-off-by: Timo Glastra <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c7f9eb3 - Browse repository at this point
Copy the full SHA c7f9eb3View commit details -
Configuration menu - View commit details
-
Copy full SHA for ef57b9d - Browse repository at this point
Copy the full SHA ef57b9dView commit details -
docs(changeset): feat(openid4vc): oid4vci authorization code flow, pr…
…esentation during issuance and batch issuance. This is a big change to OpenID4VCI in Credo, with the neccsary breaking changes since we first added it to the framework. Over time the spec has changed significantly, but also our understanding of the standards and protocols. **Authorization Code Flow** Credo now supports the authorization code flow, for both issuer and holder. An issuer can configure multiple authorization servers, and work with external authorization servers as well. The integration is based on OAuth2, with several extension specifications, mainly the OAuth2 JWT Access Token Profile, as well as Token Introspection (for opaque access tokens). Verification works out of the box, as longs as the authorization server has a `jwks_uri` configured. For Token Introspection it's also required to provide a `clientId` and `clientSecret` in the authorization server config. To use an external authorization server, the authorization server MUST include the `issuer_state` parameter from the credential offer in the access token. Otherwise it's not possible for Credo to correlate the authorization session to the offer session. The demo-openid contains an example with external authorization server, which can be used as reference. The Credo authorization server supports DPoP and PKCE. **Batch Issuance** The credential request to credential mapper has been updated to support multiple proofs, and also multiple credential instances. The client can now also handle batch issuance. **Presentation During Issuance** The presenation during issuance allows to request presentation using OID4VP before granting authorization for issuance of one or more credentials. This flow is automatically handled by the `resolveAuthorizationRequest` method on the oid4vci holder service. Signed-off-by: Timo Glastra <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bee17c8 - Browse repository at this point
Copy the full SHA bee17c8View commit details -
both token introspection and jwt flow working
Signed-off-by: Timo Glastra <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4b9e845 - Browse repository at this point
Copy the full SHA 4b9e845View commit details
Commits on Nov 9, 2024
-
feat: presentation during issuance server side
Signed-off-by: Timo Glastra <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5545919 - Browse repository at this point
Copy the full SHA 5545919View commit details -
fix: loading of verifier module
Signed-off-by: Timo Glastra <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 35c2c96 - Browse repository at this point
Copy the full SHA 35c2c96View commit details