Store the OAUTH2 id_token in the id_token extra data.#17
Store the OAUTH2 id_token in the id_token extra data.#17amichal wants to merge 1 commit intoomniauth:masterfrom
Conversation
|
For those who get here because of the logout API reference: When you have a valid |
|
Out of curiosity, when will this get merged? |
…to master" This reverts commit 279958c.
…d yet into master"" This reverts commit ef9e5eb.
|
|
We have the same situation where we need to implement logout url. Could this PR be merged? |
|
I'll try and find some time this week to review this and merge if appropriate. I don't look at this codebase super frequently, so it takes a little bit to regather context |
|
I ran into this issue today. Is there something I can do to help get this merged? |
|
@ryanswood were you able to test it out in your app using the branch? I don't run any okta-authed apps at the moment, but I'm happy to cut a release if someone confirms expected behavior |
|
@BobbyMcWho Apologies for not getting back to you sooner. I was pulled away to handle a work emergency. Next on my list is to validate the change using the PR. My first validation effort consisted of copying the change to my app using a custom inherited strategy. |
|
@BobbyMcWho I was able to test the solution in this PR using an Okta instance. I decided to slightly improve the solution by checking presence for the proper Oauth2 token and adding a spec. My PR |
We needed to implement the logout flow for OKTA. Docs here https://developer.okta.com/docs/reference/api/oidc/#logout. It is not super clear but the
id_token_hintparam is expected to be theid_tokenprovided by OKTA in response the/tokenrequest.It turns out that the
id_tokenandid_infofield inextrawhere being populated from the access_token instead of the id token. The attached change fixes that to return theid_token.I kept the nil check but the token should always be present in the response of https://developer.okta.com/docs/reference/api/oidc/#token as long we request the openid scope.