Decrypt id_token_hint and pass it at disconnection
              
              #1302
            
            Replies: 4 comments 4 replies
-
| that is interesting: why would they want to send encrypted ID tokens if they want to be able to inspect that same token at logout? the spec suggests to use a shared symmetric key in that case: https://openid.net/specs/openid-connect-rpinitiated-1_0.html#RPLogout so the OP would have the decryption key as well as the client | 
Beta Was this translation helpful? Give feedback.
-
| Oh really? Here is the official technical doc of the OP (no english translation available sadly, pardon our french ahah). I am not sure why they made their key assimetric. Contacting support at the same time about the matter | 
Beta Was this translation helpful? Give feedback.
-
| Dear maxime-helen and zandbelt, Following the support ticket we received from maxime team, we would like to exchange information about the OpenIdConnect spec and the  We also agree that it would be better to share on the logout endpoint the  To give you some context, we are using a NodeJS module OP library listed in the OpenId Foundation's certified libraries: https://github.com/panva/node-oidc-provider. From what we understand, it seems to be the case too for zandbelt implementation. Regarding the logout, our library use https://openid.net/specs/openid-connect-rpinitiated-1_0-final.html#RPLogout spec (the link is not the same as the one provided upper, but seems to have mostly the same content regarding the RP-Initiated Logout). From what we understand, the only part mentioning encryption is described in the  
 We understand that the encryption mentioned here is an exemple of use. The client_id could be used to retrieve a previously shared key between RP and OP so the later can decrypt the  We found a draft spec that seems to be more precise about the encryption / decryption of the  
 So, there seems to be at least a attempt from the OpenID Connect foundation to clarify the encryption / decryption process of the  
 The library we are using does not implement the decryption of the  At this point, we have not many options from our OP point of view: 
 To conclude: 1. and 2. would take time and would not be a good solution for maxime. 4. would be the best solution for all and 3. would be the best solution for maxime and I. Best regards, | 
Beta Was this translation helpful? Give feedback.
-
| Thanks for following up and agreed on this being a bit underspecified, but it just makes no sense to try and decrypt asymetrically encrypted tokens at the OP logout endpoint since: 
 Rather than creating a workaround in the client, the OP in this case should just issue a signed ID token (since it seems to be OK with the information in the token being public after all?), or ignore the encrypted ID token at logout time. [edit] or act on the encypred value itself or a hash of it, see #1302 (reply in thread) [/edit] | 
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
Many thanks for the module, it unlocks our oauth setups very fast
However we hit an unusual issue with a single identity provider requiring JWE, only at disconnection. They indeed expect us to provide decrypted
id_token_hintto the/session/end/call, but we send it raw as we receive it. The request ends up to a bad request because the identity provider doesn't have our private key to verify the id token hint, from what we heard from themWould you have some suggestions on how to deal with this problem ? Would there be some configurations to tweak to send
id_token_hintwith the expected format ?Thanks again
Beta Was this translation helpful? Give feedback.
All reactions