Is there any way to get the public key used by the oxd server to sign the jwt id_token so that the token can be verified later?
As far as I can tell the only way to validate credentials is to call the "get_user_info" endpoint with the access_token, however I don't think incurring this oxd network request on every access is ideal.
Also, I don't see anything in the oxd protocol that indicates how a refresh_token can be used to refresh an expired access_token. Is it just missing from the documentation?
Two excellent ideas...
The signed id_token is included in the get_tokens_by_code
API call, and this could be passed along with the public key of the OpenID Provider. In version 2.4 of the Gluu Server the id_token includes the user claims. In version 3.0 of the Gluu Server, the user claims will be included in the id_token only if you use set the "legacy_mode" JSON property. There is no way to get the signed JWT response for the get_user_info
API call. I created an enhancement for this:
https://github.com/GluuFederation/oxd/issues/65
Good idea... I added https://github.com/GluuFederation/oxd/issues/64
Yuriy, if you have anything to add, please comment. Otherwise, close the issue.
Nothing to add, everything is explained. Closing.