feat(oidc): client_secret_jwt authentication

This adds the authentication machinery for the client_secret_jwt Default Client Authentication Strategy.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
fix-pkce-flow
James Elliott 2023-04-15 20:55:38 +10:00
parent 7cf907b23d
commit a34b1412ed
No known key found for this signature in database
GPG Key ID: 0F1C4A096E857E49
1 changed files with 2 additions and 2 deletions

View File

@ -1884,11 +1884,11 @@ func TestValidateOIDCClients(t *testing.T) {
"ShouldRaiseErrorOnInvalidTokenAuthAlgClientTypeConfidential",
func(have *schema.OpenIDConnectConfiguration) {
have.Clients[0].TokenEndpointAuthMethod = oidc.ClientAuthMethodClientSecretJWT
have.Clients[0].TokenEndpointAuthSigningAlg = "abcinvalid"
have.Clients[0].TokenEndpointAuthSigningAlg = "abc"
have.Clients[0].Secret = MustDecodeSecret("$plaintext$abc123")
},
func(t *testing.T, have *schema.OpenIDConnectConfiguration) {
assert.Equal(t, "abcinvalid", have.Clients[0].TokenEndpointAuthSigningAlg)
assert.Equal(t, "abc", have.Clients[0].TokenEndpointAuthSigningAlg)
},
tcv{
nil,