By: ciaran jessup user 15 Dec 2015 at 5:27 a.m. CST

10 Responses
ciaran jessup gravatar
Hi. I'm attempting to federate an instance of [ThinkTecture.IdentityServer3](https://github.com/IdentityServer/IdentityServer3) however the JWT tokens that GLUU is passing back to my RP appear to have an incorrect 'typ' parameter specified in their header parts (it is 'JWS' not the 'JWT' that is expected.) Reading the specification it seems that one should be able to do this, however the commonly used microsoft library System.IdentityModel.Tokens.JwtSecurityToken will throw an error when attempting to decode a token with this header form ( IDX10702: Jwt header type specified, must be 'JWT' or 'http://openid.net/specs/jwt/1.0'. Type received: 'JWS'.' ) Reading through the example documentation [here](http://ox.gluu.org/doku.php?id=oxauth:jwt) the examples have the expected header typ of 'JWT' **Is there a way to configure this behaviour in gluu? **

By Michael Schwartz Account Admin 15 Dec 2015 at 12:36 p.m. CST

Michael Schwartz gravatar
We're looking into this question. One thing I'd like to point out is that that wiki page you are referencing is very old: from 2012. Can you paste in the client configuration ldif? For example # /opt/opendj/bin/ldapsearch -h localhost -p 1389 -D "cn=directory manager" -j ~/.pw -b "o=gluu" -s base 'inum=<client-id>' Replace `<client-id>` with your client id, and writing the password (temporarily) to ~/.pw (same as admin password). Don't forget the single quotes for the filter, otherwise bash will get messed up by the !.

By ciaran jessup user 15 Dec 2015 at 1:44 p.m. CST

ciaran jessup gravatar
Hmm, I executed the following command: `GLUU.root@numero-gluu:~# /opt/opendj/bin/ldapsearch -h localhost -p 1389 -D "cn=directory manager" -j ~/.pw -b "o=gluu" -s base 'inum=@!EF13.7A01.1BA5.250A!0001!80EA.221C!0008!787A.F7B8'` And got nothing in response. (I deliberately corrupt the ~/.pw file and got an 'Invalid Credentials' response so I think that part is ok. I cut'n'pasted the inum from the web interface so I'm confident that value is correct.

By Michael Schwartz Account Admin 15 Dec 2015 at 1:45 p.m. CST

Michael Schwartz gravatar
I'm sorry, my mistake. Take out the "-s base"...

By ciaran jessup user 15 Dec 2015 at 1:48 p.m. CST

ciaran jessup gravatar
dn: inum=@!EF13.7A01.1BA5.250A!0001!80EA.221C!0008!787A.F7B8,ou=clients,o=@!EF13 .7A01.1BA5.250A!0001!80EA.221C,o=gluu oxAuthScope: inum=@!EF13.7A01.1BA5.250A!0001!80EA.221C!0009!764C,ou=scopes,o=@!E F13.7A01.1BA5.250A!0001!80EA.221C,o=gluu oxAuthScope: inum=@!EF13.7A01.1BA5.250A!0001!80EA.221C!0009!43F1,ou=scopes,o=@!E F13.7A01.1BA5.250A!0001!80EA.221C,o=gluu oxAuthScope: inum=@!EF13.7A01.1BA5.250A!0001!80EA.221C!0009!F0C4,ou=scopes,o=@!E F13.7A01.1BA5.250A!0001!80EA.221C,o=gluu oxPersistClientAuthorizations: true oxAuthAppType: web oxLastAccessTime: 20151215172651.210Z oxAuthResponseType: code oxAuthResponseType: id_token oxAuthClientSecret: pYcTYmromwzigWlD/QdO3sa/hrLAKVof oxAuthPostLogoutRedirectURI: https://saserver1/vouch/core/gluucb objectClass: oxAuthClient objectClass: top oxAuthTokenEndpointAuthMethod: client_secret_jwt oxAuthRedirectURI: https://saserver1/vouch/core/gluucb oxAuthTrustedClient: false oxAuthIdTokenSignedResponseAlg: RS256 displayName: cj inum: @!EF13.7A01.1BA5.250A!0001!80EA.221C!0008!787A.F7B8

By Michael Schwartz Account Admin 15 Dec 2015 at 1:49 p.m. CST

Michael Schwartz gravatar
ok, that's helpful. Now I'll push this to the developers to take a look at.

By ciaran jessup user 15 Dec 2015 at 1:56 p.m. CST

ciaran jessup gravatar
No problem, thanks for taking a look :)

By Javier Rojas staff 17 Dec 2015 at 10:57 a.m. CST

Javier Rojas gravatar
The bug is fixed now. The fix will be include in v2.4.1 eta Wednesday 12/23. https://github.com/GluuFederation/oxAuth/issues/109

By William Lowe user 17 Dec 2015 at 11:38 a.m. CST

William Lowe gravatar
As Javier mentioned, the bug has been fixed. We're going to include it in the next update, 2.4.1. ETA for that release is Wednesday 12/23. I'll update this ticket when 2.4.1 has been pushed.

By Brian Shimek user 07 Jan 2016 at 5:54 p.m. CST

Brian Shimek gravatar
Hi, I'm seeing this issue in an ASP.net 5 MVC6 app. I see the 2.4.1.final.war files posted; should I follow a manual procedure to update from CE 2.4.0 or should I wait?

By Michael Schwartz Account Admin 07 Jan 2016 at 6:07 p.m. CST

Michael Schwartz gravatar
We're about to release 2.4.1, hopefully by Monday. This will have an update script you can run which will update the schema, install and expand the war files, and move any customizations. Its probably better to just wait at this point...