Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new intrinsic scope #575

Merged
merged 7 commits into from
Jul 22, 2022
Merged

Add new intrinsic scope #575

merged 7 commits into from
Jul 22, 2022

Conversation

mike-marcacci
Copy link
Member

@mike-marcacci mike-marcacci commented Jul 21, 2022

This adds an intrinsic ability for all authorizations to read basic information about the corresponding user, and fixes #574

This is probably the preferred implementation, but does restrict the evolution of this project in an important way: it effectively removes our ability to use a pairwise identifier algorithm for subject IDs in our OAuth flow, as this provides a trivial bypass. Our internal use case will never depend on this, as we control and sufficiently trust all clients and resources to the extent that we have no privacy concerns in the same way Google or Facebook might when supplying a public OpenID Connect service.

Given that AuthX currently does not support this option, it's doubtful that any other users expect or rely on this functionality. Nevertheless I think it's important to call out.

This adds an intrinsic ability for all authorizations to read basic information about the corresponding user, and fixes #574
@mike-marcacci mike-marcacci merged commit cf26f7a into main Jul 22, 2022
@mike-marcacci mike-marcacci deleted the intrinsic_user_read_basic branch July 22, 2022 19:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Fix inconsistent expectations for BASIC token access.
3 participants