Feat: Modified Id Token Validation#221
Conversation
|
It looks like your comment is just a mention without any specific request. Could you clarify what you'd like me to help with? |
|
Please review the PR |
Here's my review of the PR: Overall: ✅ Good change — reduces custom crypto code and enforces mandatory signature verification. Strengths
Issues / Observations1. // RequestProcessor.java:350
return jwkProviders.computeIfAbsent(domain, d -> new UrlJwkProvider(d));
2. String algorithm = JWT.decode(idToken).getAlgorithm();Reading 3. 4. No test for the auto-discovered Minor nits
|
Summary
IdTokenVerifierandSignatureVerifieralgheader: RS256 uses JwkProvider (auto-discovered or customer-provided), HS256 uses client secretConcurrentHashMapcache instead of a single fixed verifierIdTokenVerifier,SignatureVerifier,AlgorithmNameVerifier,AsymmetricSignatureVerifier,SymmetricSignatureVerifier,TokenValidationExceptionSecurity fix
Now all tokens are cryptographically verified.
Breaking changes