Skip to content

Make authorization server configurable#9

Merged
dandrews merged 7 commits intoomniauth:masterfrom
hectron:master
Nov 4, 2019
Merged

Make authorization server configurable#9
dandrews merged 7 commits intoomniauth:masterfrom
hectron:master

Conversation

@hectron
Copy link
Contributor

@hectron hectron commented Oct 1, 2019

Problem

I ran into the issue where I have multiple authorization servers in Okta and did not use the default authorization server.

OmniAuth::Strategies::Okta hard codes the userinfo endpoint to the default authorization server. Additionally, it tries to use the base URL authorization server to decode the JWT, as well as determine the audience (e.g. http://my-okta-url/oauth2/v1 as opposed to http://my-okta-url/oauth2/<custom or default>/v1. The default audience is api://default.)

Proposal

Add some configuration to allow us to support more than just the default authorization server, and also remove any kind of hard-coded endpoints.

Hector Rios and others added 7 commits March 8, 2019 16:24
This commit allows users to set a custom authorization server, in the
event that they may have more than just one.

It also fixes the way that the ID/Access token are decrypted, based on
which authorization server it comes from.
@hectron hectron marked this pull request as ready for review October 1, 2019 23:47
@hectron
Copy link
Contributor Author

hectron commented Nov 4, 2019

Any thoughts on merging this, @dandrews ?

@dandrews dandrews merged commit a46708d into omniauth:master Nov 4, 2019
@dandrews
Copy link
Collaborator

dandrews commented Nov 4, 2019

Thanks @hectron - the PR is much appreciated

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants