Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Openemr fix 5704 5705 pkce oauth2 clients #5706

Conversation

adunsulag
Copy link
Member

Fixes #5704
Fixes #5705

Put in support for PKCE and restricted it to only support the S256
code_challenge_method per the SMART on FHIR requirements.

Added to our smart configuration the PKCE support as well as the
capability that we only support the v1 smart scopes at this point in
time.

Added a global flag that controls how app authorizations are done. US
jurisdictions need to use the auto-enabling of patient standalone apps
or need to manually approve patient apps within 48 hours. Other
jurisidictions can turn off all app approval if they wish to have
tighter control of their security.

Fixed some bugs with the OAuth2 authorization_code, password, and
refresh grants.

Allowed offline_access scope for public patient standalone apps.
Patients will be warned when offline_access is granted.

Updated API documentation per ONC requirements for PKCE information.

Put in support for PKCE and restricted it to only support the S256
code_challenge_method per the SMART on FHIR requirements.

Added to our smart configuration the PKCE support as well as the
capability that we only support the v1 smart scopes at this point in
time.

Added a global flag that controls how app authorizations are done.  US
jurisdictions need to use the auto-enabling of patient standalone apps
or need to manually approve patient apps within 48 hours.  Other
jurisidictions can turn off all app approval if they wish to have
tighter control of their security.

Fixed some bugs with the OAuth2 authorization_code, password, and
refresh grants.

Allowed offline_access scope for public patient standalone apps.
Patients will be warned when offline_access is granted.

Updated API documentation per ONC requirements for PKCE information.
@bradymiller
Copy link
Member

code looks good to me :)
(note api testing is failing on the ci stuff)

Discovered the api tests were failing which is GREAT as it means some of
our bug fixes are working.  Disabled clients using the password grant
were being rejected.  We have to enable the client in order for the
tests to communicate via the api.
@adunsulag adunsulag marked this pull request as ready for review August 31, 2022 20:36
@adunsulag
Copy link
Member Author

So the API tests failing were actually a good sign that things were working :) Fixed the API clients to enable the password grant clients.

@adunsulag adunsulag merged commit 3e3f09e into openemr:master Aug 31, 2022
adunsulag added a commit to DiscoverAndChange/openemr that referenced this pull request Aug 31, 2022
* WIP openemr#5704, openemr#5705 PKCE, OAuth2 app approvals

Put in support for PKCE and restricted it to only support the S256
code_challenge_method per the SMART on FHIR requirements.

Added to our smart configuration the PKCE support as well as the
capability that we only support the v1 smart scopes at this point in
time.

Added a global flag that controls how app authorizations are done.  US
jurisdictions need to use the auto-enabling of patient standalone apps
or need to manually approve patient apps within 48 hours.  Other
jurisidictions can turn off all app approval if they wish to have
tighter control of their security.

Fixed some bugs with the OAuth2 authorization_code, password, and
refresh grants.

Allowed offline_access scope for public patient standalone apps.
Patients will be warned when offline_access is granted.

Updated API documentation per ONC requirements for PKCE information.

* Fix stlye issues

* Fix API Tests use enabled client

Discovered the api tests were failing which is GREAT as it means some of
our bug fixes are working.  Disabled clients using the password grant
were being rejected.  We have to enable the client in order for the
tests to communicate via the api.
bradymiller pushed a commit that referenced this pull request Aug 31, 2022
* WIP #5704, #5705 PKCE, OAuth2 app approvals

Put in support for PKCE and restricted it to only support the S256
code_challenge_method per the SMART on FHIR requirements.

Added to our smart configuration the PKCE support as well as the
capability that we only support the v1 smart scopes at this point in
time.

Added a global flag that controls how app authorizations are done.  US
jurisdictions need to use the auto-enabling of patient standalone apps
or need to manually approve patient apps within 48 hours.  Other
jurisidictions can turn off all app approval if they wish to have
tighter control of their security.

Fixed some bugs with the OAuth2 authorization_code, password, and
refresh grants.

Allowed offline_access scope for public patient standalone apps.
Patients will be warned when offline_access is granted.

Updated API documentation per ONC requirements for PKCE information.

* Fix stlye issues

* Fix API Tests use enabled client

Discovered the api tests were failing which is GREAT as it means some of
our bug fixes are working.  Disabled clients using the password grant
were being rejected.  We have to enable the client in order for the
tests to communicate via the api.
@adunsulag adunsulag deleted the openemr-fix-5704-5705-pkce-oauth2-clients branch April 5, 2024 18:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants