Benoit Tellier created JAMES-3755:
-------------------------------------

             Summary: IMAP OIDC: optional configuration of a 
token_instrospection endpoint
                 Key: JAMES-3755
                 URL: https://issues.apache.org/jira/browse/JAMES-3755
             Project: James Server
          Issue Type: Improvement
          Components: IMAPServer, SMTPServer
    Affects Versions: 3.7.0
            Reporter: Benoit Tellier
             Fix For: 3.8.0


Today upon receiving a OIDC auth request James verifies the signature against a 
configured JWKS endpoint to validate the token.

This decentralized design do not account for revocation.

Several solution to this problem exists:

 - Calling the OIDC provider introspection endpoint to validate the token
 - Or having a set of invalidated token maintained by the application, this 
needs to be updated by a backchannel from the OIDC provider.

While my favor tend to go to the second one, the first one is rather common to.

To give an exemple, one of my customers is required to implement the first 
approach: calling the introspection endpoint.

h3. Proposed solution

 - Optional configurable endpoint for checking token validity
 - If specified this endpoint will be called to validate OIDC tokens

The call can be performed using a reactor-netty HTTP client.

h3. References

 - https://datatracker.ietf.org/doc/html/rfc7662 RFC-7662 OAuth 2.0 Token 
Introspection



--
This message was sent by Atlassian Jira
(v8.20.7#820007)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org
For additional commands, e-mail: server-dev-h...@james.apache.org

Reply via email to