By: Patrick McKinnon user 03 Jan 2017 at 5:28 p.m. CST

3 Responses
Patrick McKinnon gravatar

Is there any way to get the public key used by the oxd server to sign the jwt id_token so that the token can be verified later?

As far as I can tell the only way to validate credentials is to call the "get_user_info" endpoint with the access_token, however I don't think incurring this oxd network request on every access is ideal.

Also, I don't see anything in the oxd protocol that indicates how a refresh_token can be used to refresh an expired access_token. Is it just missing from the documentation?

By Michael Schwartz Account Admin 03 Jan 2017 at 10:56 p.m. CST

Michael Schwartz gravatar

Two excellent ideas...

  1. The signed id_token is included in the get_tokens_by_code API call, and this could be passed along with the public key of the OpenID Provider. In version 2.4 of the Gluu Server the id_token includes the user claims. In version 3.0 of the Gluu Server, the user claims will be included in the id_token only if you use set the "legacy_mode" JSON property. There is no way to get the signed JWT response for the get_user_info API call. I created an enhancement for this: https://github.com/GluuFederation/oxd/issues/65

  2. Good idea... I added https://github.com/GluuFederation/oxd/issues/64

By Michael Schwartz Account Admin 03 Jan 2017 at 10:57 p.m. CST

Michael Schwartz gravatar

Yuriy, if you have anything to add, please comment. Otherwise, close the issue.

By Yuriy Zabrovarnyy staff 04 Jan 2017 at 3:03 a.m. CST

Yuriy Zabrovarnyy gravatar

Nothing to add, everything is explained. Closing.