Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add client metadata + API #2488

Merged
merged 3 commits into from
Sep 18, 2023
Merged

Add client metadata + API #2488

merged 3 commits into from
Sep 18, 2023

Conversation

gerardsn
Copy link
Member

@gerardsn gerardsn commented Sep 13, 2023

I tried to fill out as much as possible, but there are still a bunch of unknowns (tagged with TODOs). I've skipped all the fields related to openid connect / id_token for now. We can add these as needed.

@@ -280,3 +280,273 @@ type OpenID4VCIFields struct {
PreAuthorizedGrantAnonymousAccessSupported bool `json:"pre-authorized_grant_anonymous_access_supported"`
//OPTIONAL. A JSON Boolean indicating whether the issuer accepts a Token Request with a Pre-Authorized Code but without a client id. The default is false.
}

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is a scratch pad with comments useful during development

auth/api/iam/api.go Show resolved Hide resolved
auth/api/iam/api.go Show resolved Hide resolved
softwareID, softwareVersion, _ := strings.Cut(core.UserAgent(), "/")
return OAuthClientMetadata{
//RedirectURIs: nil,
TokenEndpointAuthMethod: "client_secret_basic", // TODO: this is the default value, what do we support
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm guessing it would become vp_token-bearer?

Copy link
Member Author

@gerardsn gerardsn Sep 14, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

that would require defining a client assertion type using the vp_token next to the grant_type similar to RFC7523 describing a
urn:ietf:params:oauth:client-assertion-type:jwt-bearer and
urn:ietf:params:oauth:grant-type:jwt-bearer

docs/_static/auth/iam.yaml Outdated Show resolved Hide resolved
auth/api/iam/types.go Show resolved Hide resolved
auth/api/iam/metadata_test.go Show resolved Hide resolved
TokenEndpointAuthMethod: "client_secret_basic", // TODO: this is the default value, what do we support
GrantTypes: grantTypesSupported,
ResponseTypes: responseTypesSupported,
//Scope: "",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

remove comments

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I left them as comments to see what fields still need to added, but I will remove them.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left the remaining values commented. They either need to be set by the time these flows are implmented or removed.

@gerardsn gerardsn force-pushed the oauth/client-metadata branch from b0b2023 to 0b84dfd Compare September 18, 2023 08:59
@gerardsn gerardsn merged commit 551c8a1 into master Sep 18, 2023
6 checks passed
@gerardsn gerardsn deleted the oauth/client-metadata branch September 18, 2023 09:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants