-
Notifications
You must be signed in to change notification settings - Fork 238
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should at_hash claim verification fail when missing from JWT? #75
Comments
You are correct, based on the spec, that shouldn't fail on a missing That shouldn't be too hard to fix up. |
Any chance this change (#76) can be released to PyPi ? |
Would it be possible to have this change available through PyPI in a new release? I'm now doing a |
It looks like
at_hash
in JWT payload is optional (see http://openid.net/specs/openid-connect-core-1_0.html#CodeIDToken).However, in python-jose, when both
id_token
andaccess_token
parameters are specified, decoding a JWT that has noat_hash
claim raises an error (at_hash claim missing from token)https://github.com/mpdavis/python-jose/pull/30/files#diff-b106d01229785c64375df96ca4b3f58cR422
Shouldn't it be acceptable since the spec says it's optional?
Obviously we can disable at_hash verification with the appropriate decode option, but we find it useful to perform claims verification on JWT that have it or not with the same code. Maybe with a
allow_missing_at_hash
option or something?Huge thanks for this lib 😻
The text was updated successfully, but these errors were encountered: