You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I purpose a human readable message in this PR, to drive the users in a correct configuration (just to understand how thing should be done to get it to work). At the same time I'd think also to a global configuration parameters that could set that minimum value, an approch like:
I'm working on a concise Paper with some general warnings about Shib CSCfi OIDC configuration. That's something to submit for revision of collegues that develops shibboleth,I will notify you on this before that happens
Good news.
At the sane time I didn't get idpy rp to work with cscfi op (access token fails signature validation RP side). IHope to have a deeper look in It, let me know of you've interest in this compatibility test, After all It looks quite strange
Well, the error is slightly of target. If you look a bit further up on the trace you see idt = IdToken().from_jwt(str(msg[claim]), **args)
That's really what's happening.
Don't know where AccessToken comes from.
The CSCfitutorial they made shows us how to create some JWKs.
These are not related to the preexisting RSA key/cert (in PEM format) used by IdP to sign payloads, but something different, not involved in the real jws operations.I was able to verify the tokens by creating a JWK starting from idp's cert/key in PEM format.
So I create some new jwks with this, and it works
import json
from cryptojwt.jwk.x509 import import_public_key_from_cert_file
from cryptojwt.jwk.rsa import import_private_rsa_key_from_file
from cryptojwt.jwk.rsa import RSAKeyIDP_HOME = "/opt/shibboleth-idp"private = import_private_rsa_key_from_file(f'{IDP_HOME}/credentials/idp-signing.key')
rsa_key = RSAKey(priv_key=private)
print(json.dumps(rsa_key.serialize(), indent=2))
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
A simple commit that wants to focus on an error message reported to users.
Standing on CSCfi shib oidc op guide the example client_secret is
topsecret. That's something that users tends to use as it is for test setups.cryptojwt instead, have a default minimum length secret, as a policy, it seems quite hardcoded here:
JWTConnect-Python-CryptoJWT/src/cryptojwt/jwk/hmac.py
Line 59 in 030b1c6
I purpose a human readable message in this PR, to drive the users in a correct configuration (just to understand how thing should be done to get it to work). At the same time I'd think also to a global configuration parameters that could set that minimum value, an approch like:
This is a WiP, probably I'd add others stuffs here.
that's also a footprint on the test I made: