fix: include the jwk key id in the jwt for validation (#1983)
This is so the sig key used to sign the JWT can be verified using the JWKS endpoint. Fixes #1979pull/1985/head^2
parent
544373de17
commit
c0ac8bf5ad
|
@ -100,7 +100,10 @@ func newDefaultOIDCSession(ctx *middlewares.AutheliaCtx) (session *openid.Defaul
|
||||||
Extra: make(map[string]interface{}),
|
Extra: make(map[string]interface{}),
|
||||||
},
|
},
|
||||||
Headers: &jwt.Headers{
|
Headers: &jwt.Headers{
|
||||||
Extra: make(map[string]interface{}),
|
Extra: map[string]interface{}{
|
||||||
|
// TODO: Obtain this from the active keys when we implement key rotation.
|
||||||
|
"kid": "main-key",
|
||||||
|
},
|
||||||
},
|
},
|
||||||
}, err
|
}, err
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue