By: Ashwin Devanathan user 20 Oct 2017 at 3:13 p.m. CDT

11 Responses
Ashwin Devanathan gravatar
{"error":"unsupported_response_type","error_description":"The authorization server does not support obtaining an access token using this method.","state":"LQ3jhPy2Sj1o-MpocH5wpqEw_Gw"} The URL going to the Gluu : https://hostname/oxauth/restv1/authorize?response_type=id_token&scope=openid%20profile%20email&client_id=%40%213DE3.F0E0.3C74.9A86%210001%213D39.4D75%210008%2125D3.45AC.F52E.195C&state=LQ3jhPy2Sj1o-MpocH5wpqEw_Gw&redirect_uri=https%3A%2F%2F192.168.180.68%3A8443%2Fcallback&nonce=QO6fOMImH1foqvBg_BmPagzeCkFatV5mggQ_7x8nBDM we tried saml also but getting config error. can you help?

By William Lowe user 20 Oct 2017 at 3:20 p.m. CDT

William Lowe gravatar
Ashwin, How can we reproduce the error? Thanks, Will

By Aliaksandr Samuseu staff 20 Oct 2017 at 3:59 p.m. CDT

Aliaksandr Samuseu gravatar
Hi, Ashwin. You seem to try to use a very specific type of implicit flow, judging by this request parameter: `response_type=id_token`. Is it your intention, and did you configure you client's metadata at Gluu to be ready for it? Could you perhaps provide screenshots of page with all its settings?

By Aliaksandr Samuseu staff 21 Oct 2017 at 8:20 a.m. CDT

Aliaksandr Samuseu gravatar
Hi, Adam. Just to make sure: can you log in to Gluu's admin web UI? If you can, then it seems like you have some issues when trying to configure its interoperability with `mod_openidc`. In such case please gather and share more details on your configuration, including screenshots of pages with relevant settings and [logs](https://gluu.org/docs/ce/3.1.1/operation/logs/). `mod_openidc` should register its client dynamically at Gluu, you should be able to see it in the list of OIDC clients clearly (it names it in a special way). Please check our ["How to ask" guide](https://support.gluu.org/docs/user-guide/how-to-ask/) I'll try to check that setup when I'll have some time as well.

By Aliaksandr Samuseu staff 21 Oct 2017 at 9 a.m. CDT

Aliaksandr Samuseu gravatar
Not sure there is some manual, you can check [its spec](https://openid.net/specs/openid-connect-registration-1_0.html) though. Here are the sample requests with curl: - `POST REQUEST` ``` curl -k -X POST -H "Content-Type: application/json" -d '{"redirect_uris":["https://127.0.0.1:8080/login-redirect"],"response_types":["code token,id_token"],"grant_types":["authorization_code"],"applicationType":"web"}' 'https://your.gluu.host/oxauth/restv1/register' ``` `POST RESPONSE` ``` { "client_id": "@!3BBD.C34D.BA66.49B3!0001!17D5.1A00!0008!9C65.DE26.6A1A.F73F", "client_secret": "XXXXXXXXXXXXXXXXXXXXXXXXXX", "registration_access_token": "YYYYYYYYYYYYYYYYYYYYYYYYYYY", "registration_client_uri": "https://your.gluu.host/oxauth/restv1/register?client_id=@!3BBD.C34D.BA66.49B3!0001!17D5.1A00!0008!9C65.DE26.6A1A.F73F", "client_id_issued_at": 1503370360, "client_secret_expires_at": 1503456760, "redirect_uris": ["https://127.0.0.1:8080/login-redirect"], "response_types": ["code"], "grant_types": [ "refresh_token", "authorization_code" ], "application_type": "web", "client_name": "127.0.0.1", "subject_type": "pairwise", "id_token_signed_response_alg": "RS256", "token_endpoint_auth_method": "client_secret_basic", "require_auth_time": false, "frontchannel_logout_session_required": false, "scopes": [ "permission", "openid", "uma_protection" ] } ``` Pay attention to `registration_access_token` and `client_id` fields you will use them in the PUT and GET requests as a "Authorization" header and as a query parameter respectively. - `PUT REQUEST.` This request will update field `client_name`, ``` curl -k -X PUT -H "Authorization: Bearer YYYYYYYYYYYYYYYYYYYYYYYYYYY" -H "Content-Type: application/json" -d '{"client_name":"New Client Name"}' 'https://your.gluu.host/oxauth/restv1/register?client_id=@!3BBD.C34D.BA66.49B3!0001!17D5.1A00!0008!9C65.DE26.6A1A.F73F' ``` `PUT RESPONSE` ``` { "client_id": "@!3BBD.C34D.BA66.49B3!0001!17D5.1A00!0008!9C65.DE26.6A1A.F73F", "client_secret": "XXXXXXXXXXXXXXXXXXXXXXXXXX", "registration_access_token": "YYYYYYYYYYYYYYYYYYYYYYYYYYY", "registration_client_uri": "https://your.gluu.host/oxauth/restv1/register?client_id=@!3BBD.C34D.BA66.49B3!0001!17D5.1A00!0008!9C65.DE26.6A1A.F73F", "client_id_issued_at": 1503370360, "client_secret_expires_at": 1503456760, "redirect_uris": ["https://127.0.0.1:8080/login-redirect"], "response_types": ["code"], "grant_types": [ "refresh_token", "authorization_code" ], "application_type": "web", "client_name": "New Client Name", "subject_type": "pairwise", "id_token_signed_response_alg": "RS256", "token_endpoint_auth_method": "client_secret_basic", "require_auth_time": false, "frontchannel_logout_session_required": false, "scopes": [ "permission", "openid", "uma_protection" ] } ``` - `GET REQUEST` ``` curl -k -X GET -H "Authorization: Bearer YYYYYYYYYYYYYYYYYYYYYYYYYYY" -H "Content-Type: application/json" 'https://your.gluu.host/oxauth/restv1/register?client_id=@!3BBD.C34D.BA66.49B3!0001!17D5.1A00!0008!9C65.DE26.6A1A.F73F' ``` `GET RESPONSE` ``` { "client_id": "@!3BBD.C34D.BA66.49B3!0001!17D5.1A00!0008!9C65.DE26.6A1A.F73F", "client_secret": "XXXXXXXXXXXXXXXXXXXXXXXXXX", "registration_access_token": "YYYYYYYYYYYYYYYYYYYYYYYYYYY", "registration_client_uri": "https://your.gluu.host/oxauth/restv1/register?client_id=@!3BBD.C34D.BA66.49B3!0001!17D5.1A00!0008!9C65.DE26.6A1A.F73F", "client_id_issued_at": 1503370360, "client_secret_expires_at": 1503456760, "redirect_uris": ["https://127.0.0.1:8080/login-redirect"], "response_types": ["code"], "grant_types": [ "refresh_token", "authorization_code" ], "application_type": "web", "client_name": "New Client Name", "subject_type": "pairwise", "id_token_signed_response_alg": "RS256", "token_endpoint_auth_method": "client_secret_basic", "require_auth_time": false, "frontchannel_logout_session_required": false, "scopes": [ "permission", "openid", "uma_protection" ] } ```

By William Lowe user 23 Oct 2017 at 9 a.m. CDT

William Lowe gravatar
Adam, Can you clarify where/what should be updated in the docs? Alternatively, if you are feeling generous, you could submit a merge request with the docs that we can review and merge. All the docs are hosted on github. Here is the [mod_auth doc](https://github.com/GluuFederation/docs-ce-prod/blob/3.1.1/3.1.1/source/integration/sswebapps/openidc-rp.md). Thanks in advance, Will

By William Lowe user 26 Oct 2017 at 11:18 a.m. CDT

William Lowe gravatar
Hi Adam, Can you open a new ticket for this? That way I can assign to the proper engineer. Thanks! Will

By Jajati Badu Account Admin 11 Nov 2017 at 1:11 a.m. CST

Jajati Badu gravatar
I don't think the issue is with C# Sample application. The OP host url is wrong . Should be op_host":"https://idp.somedomain.com"