Replies: 4 comments 9 replies
-
Please provide something tangible, else i cannot help you. Your Node.js version, client metadata, actual tokens, keys, stack traces, userinfo responses, etc. |
Beta Was this translation helpful? Give feedback.
-
You're probably not running a node.js version capable of this algorithm. >= 12.9.0 is required. Either that, or the key's |
Beta Was this translation helpful? Give feedback.
-
Is your JWE Content plaintext json? then set your client's |
Beta Was this translation helpful? Give feedback.
-
Irrelevant, what matters is the client metadata. |
Beta Was this translation helpful? Give feedback.
-
Hello,
I'm trying to validate our custom IDP with openidconnect protocol.
For the test we try to use most common and wellknown node-openid-client, we have now 2 problems :
First, when we configure the RSA key with RSA-OAEP on the client and on the server, all the parsing IDtoken is good.
But when we change only the algo with RSA-OAEP-256 on the client and on the server, the private key on the client is not seen as candidate to decrypt.=> JWKSNoMatchinKey (the candidate is false on the keystore.all on node_module/jose/lib/jwks/keystore.js)
Second, with le RSA-OAEP, we try also to deliver the userInfo with encryption, and there is an exception with "ParseError: Unexpected token e in JSON at position 0 " because it's a JWE so in Base64 encoding.
So how the request userInfo select the JSON simple format and the JWE format with the response it receive ?
We try to follow the RFC with "content-type":"application/jwt;charset=UTF-8" instead of "content-type":"application/json;charset=UTF-8" biut with no difference...
Can i Have somme help to validate the userinfo encryption ?
Beta Was this translation helpful? Give feedback.
All reactions