Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Logout Token Validation Support? #211

Open
rickwang7712 opened this issue Aug 30, 2019 · 5 comments · May be fixed by #251
Open

Logout Token Validation Support? #211

rickwang7712 opened this issue Aug 30, 2019 · 5 comments · May be fixed by #251

Comments

@rickwang7712
Copy link

rickwang7712 commented Aug 30, 2019

According to: https://openid.net/specs/openid-connect-backchannel-1_0.html#Validation
I think if there is a function like func (v *IDTokenVerifier) Verify for Logout Token Validation would be nice... Or is there already a function that I could call?

@rickwang7712 rickwang7712 changed the title Verify Logout Token Support? Logout Token Verification Support? Aug 30, 2019
@rickwang7712 rickwang7712 changed the title Logout Token Verification Support? Logout Token Validation Support? Aug 30, 2019
@ericchiang
Copy link
Collaborator

This package currently doesn't implement logout token logic. It'd be helpful to know what providers implement this and what real-world use cases look like.

@rickwang7712
Copy link
Author

rickwang7712 commented Sep 10, 2019

Ory Hydra implements OpenID Connect Back-Channel Logout 1.0 which has logout token logic.
For my use case, I follow the back-channel spec to implement remote logout feature(ex. use desktop webportal to logout mobile device).

@rickwang7712
Copy link
Author

Sorry, last time I gave an unusual example. I would like to update.
backchannel-logout is one of the features which support single-sign-out, the other one is frontchannel-logout.
If a browser has multiple RPs login, and after one RP requests logout, the server will emit backchannel-logout api to the rest of the RPs which are related with the authentication session(the cookie which helps achieve single-sign-on).

There are many oidc server implementation supports this feature. For example:

I know google's oidc server hasn't support this feature yet, but this project doesn't restrict its users to google's oidc service only, right?

To solve the logout validation problem I have already had solution based on this project, may I make contribution to here?

@ericchiang
Copy link
Collaborator

Since those specs are still a Draft we'd probably want to wait before adding new APIs to this package.

You should be able to use most of the Verify method to validate a logout token. Then use Claims() to pull out the events and sid claims. Does that satisfy your use case?

@like-a-bause like-a-bause linked a pull request Jun 12, 2020 that will close this issue
@lwj5
Copy link

lwj5 commented Oct 4, 2022

@ericchiang now that the spec is final, will the PR be reviewed or considered?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants