-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace /userinfo
call with the existing JWT info
#192
Comments
Hi @hexedpackets, thanks for your other pull-request :) I'd be happy to remove the call to
Thanks very much for your contribution ! |
So as far as documentation, the most explicit page I've found is the OpenID Connect Scopes description which states:
The ID Token Structure page also describes the token in more detail, although it doesn't mention I can't say if it was always the case or when it might have changed, but the current OAuth code exchange will always return the ID token. The Authorization Code Flow doc states this:
It might not be the case for other flows, but unless I'm mistaken the code exchange is the only OAuth flow this library uses. Does that evidence sound reasonable to you? I actually already have the JWT decoding on a branch in my fork, so it would be pretty quick to put together a PR for it. |
Hey :) This evidence sounds reasonable indeed. Let's try this. Let's create the PR and I'll do some tests on a live auth0 system to check if I always get a JWT ID token even when changing the auth0 options and if it works, we'll use it instead of the Thank you very much ! |
Hello! We are running into Rate Limit errors because of this, Auth0 support suggested we use the |
@achedeuzot Draft PR here: #235 What do you think? :) |
The response from auth0 when authorizing returns both a
token
and anid_token
. Theid_token
seems to have the same information as the/userinfo
endpoint, making the extra call unnecessary.Would you be open to a PR that decodes the
id_token
JWT for creating the user struct? The reason I want to do this is if an Auth0 API is using HS256 as its signing algorithm, there's no way to get an access token for both the API and the/userinfo
endpoint.The text was updated successfully, but these errors were encountered: