Commit Graph

11 Commits (4db8f3e23e73c737189dc97d770a0e34151e2427)

Author SHA1 Message Date
Lorenz Brun 4db8f3e23e Improve OIDC SSO
The OIDC implementation merged in #491 is flawed for multiple reasons.
It assumes that the access_token returned by the IDP has to be a JWT
parseable by the RP which is not the case [1].
Many major IDPs do issue tokens which are not JWTs and RPs should not
rely on the contents of these at all.
The only signed token which has a standardized format for direct RP
consumption is the OIDC
ID token (id_token), but this by default doesn't contain many claims,
especially role claims are omitted from them by default for size
reasons. To get these additional claims into the ID token, one needs an
IDP with support for the "claims" parameter.

It requires manual specification of the JWKS URL which is mandatory
in any OIDC discovery document and thus never needs to be manually
specified.

It also makes the questionable decision to use a client-side code flow
with PKCE where a normal code flow would be much more appropriate as
all user data is processed in the backend which can securely hold a
client secret (confidential client). This has far wider IDP support and
doesn't require working with ID tokens and claim parameters.

By using a server-side code flow we can also offload most complexity to
the server alone, no longer requiring an additional OIDC library on the
web client.

Also silent logout doesn't work on most IDPs for security reasons, one
needs to actually redirect the user over to the IDP, which then prompts
them once more if they actually want to log out.

This implementation should work with any OIDC-compliant IDP and even
OAuth 2.0-only IDPs as long as they serve and OIDC discovery document.

[1] https://www.rfc-editor.org/rfc/rfc6749#section-5.1
2 years ago
Maksim Eltyshev 9f16881965 fix: Socket bug fixes and improvements 3 years ago
Maksim Eltyshev 8109936ce2 feat: Invalidate access token on logout 3 years ago
SimonTagne 7786533a90
feat: Improve security of access tokens (#279)
Closes #275
3 years ago
Maksim Eltyshev 486e663a3d feat: Store accessToken in cookies instead of localStorage 4 years ago
Maksim Eltyshev b39119ace4 Project managers, board members, auto-update after reconnection, refactoring 5 years ago
Maksim Eltyshev af00e3e191 Add username to user 6 years ago
Maksim Eltyshev 9c7c96a780 Move from prettier-eslint to eslint-plugin-prettier, update dependencies 6 years ago
Maksim Eltyshev a11f6260c0 Code formatting with prettier, change eslint config for the server 6 years ago
Maksim Eltyshev e8139b29d5 Change id generation algorithm, display notifications total on the main page 6 years ago
Maksim Eltyshev 5ffef61fe7 Initial commit 6 years ago