-
Notifications
You must be signed in to change notification settings - Fork 970
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Track OIDC tokens #1818
Track OIDC tokens #1818
Conversation
This feature introduce a crypt/decrypt package use for access/refresh token for now Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
remove useless handler improve general identity handler
This feature introduce a crypt/decrypt package use for access/refresh token for now Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
remove useless handler improve general identity handler
# Conflicts: # contrib/quickstart/kratos/email-password/kratos.yml # go.mod # go.sum
docs: add reveal_credentials in api docs: add releal creadential guide docs: insert AES note in secret key rotations config: set right attribute in config schema conifg: improve SecretsAES method add AES test in config improvement: use cipher from registry in identity handler chore: remove useless method and remove useless struct
This feature introduce a crypt/decrypt package use for access/refresh token for now Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
remove useless handler improve general identity handler
This feature introduce a crypt/decrypt package use for access/refresh token for now Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
remove useless handler improve general identity handler
docs: add reveal_credentials in api docs: add releal creadential guide docs: insert AES note in secret key rotations config: set right attribute in config schema conifg: improve SecretsAES method add AES test in config improvement: use cipher from registry in identity handler chore: remove useless method and remove useless struct
Signed-off-by: David ALEXANDRE <david.alexandre@w6d.io>
fix aes test
# Conflicts: # driver/config/config.go # go.mod # go.sum
1b9ccc8
to
f4c8d08
Compare
65cd7b5
to
d9cda5c
Compare
Good
but the password part disappear if I do
I understand that the password should not appear but I expected at least to see the same information |
@aeneasr |
# Conflicts: # identity/handler.go
@david972 addressed! |
@david972 thank you for your hard work! |
@aeneasr |
We are fetching the tokens using this feature, but where we are having difficulty is if someone unauthenticates our app from the oidc host side, invalidating the token, and then reauthenticates again. it seems like, in this case, kratos simply throws out the new tokens. I understand Hydra exists for this case, but I am also of the opinion that kratos has all the data it needs and a place to store it, it wouldn't be hard for it to do so. Perhaps I am incorrect and we are not using it properly, we are mistaken, or have missed some configuration flag. Thanks! |
@factoidforrest I see this issue as well. Why not replace the tokens on every login flow with the new ones issued by the OIDC provider? |
feat: API to return access, refresh, id tokens from social sign in
This patch introduces the new
include_credential
query parameter to theGET /identities
endpoint which allows administrators to receive the initial access, refresh, and ID tokens from Social Sign In (OpenID Connect / OAuth 2.0) flows.These tokens can be stored in an encrypted format (XChaCha20Poly1305 or AES-GCM) in the database if an appropriate encryption secret is set. To get started easily these values are not encrypted per default.
For more information head over to the docs.
Closes #1518
Closes #397