-
Notifications
You must be signed in to change notification settings - Fork 26
Don't write jwks to disc #93
Comments
It depends by read_only, if True it won't create/write anything oidc-op/src/oidcop/token/handler.py Line 176 in 0f92cfb
Probably we could handle this jwks initialization in a single,way, in a unique function. |
Yes but it also forces the oidc-op/src/oidcop/token/handler.py Line 172 in 0f92cfb
If this jwks is not needed (access token and ID token can be JWT) why force a private path? I don't need to keep those keys |
Actually we deal with jwks forgery in
I'm wondering if it could be better to handle only in endpoint_context and not also in token handler BUT that's not the question. If I have well understand you're are saying that we should need an option that forces, optionally, the token minting in JWE format and also this parameter would handle the jwks defs. overall, I have to be honest, I'd like to have an example about how to get tokens in JWE format, standing of an example configuration. @rohe what did I miss this time? :) |
So, we're witnessing a change in usage here. Now, token handler uses the same keys as are used for signing/encrypting messages so there are really no need for a set of special keys for just access/refresh JWS tokens. I'm leaning against having 2 JWKS definitions, one for endpoint_context which then will be used for all type of JWT based tokens an all type of messages and one for symmetric keys that needs to be persistent over restarts (here the kid is used to distinguished between the keys). Allowing both sets of keys to be constructed before the first start of the server. I want to get away from having lines like this in the configuration: key: "A long rambling set of characters" We should never trust people to come up with reasonable keys. |
I agree that these keys should be persisted in a production environment. But when I'm running it on my machine for development/testing I don't want the keys to be written in the disc. I should be able to choose whether I want them saved. |
OK, sounds fair |
Sounds good, we Need a roadmap now 🐕 |
So what keyword should we use in the configuration to flag this ? Ephemeral ? Like this:
|
Ephemeral? Ok, but not without documentation!!! Let's see. Anyway, I follow you |
What are the use cases ?:
There might be something in-between 2 and 3. Where you provide some but not all of the necessary keys. |
Token handler is part of the endpoint context so I don't see the need for having it higher up. |
Good to me @rohe, few things not so important right now. |
I guess the policy for doing JWE instead of JWS could be quite complex. |
This issue causes to satosa oidcop frontend to write private files related to cookies to disk, even if satosa frontend doesn't use oidcop cookies. Do we have a way to put them in a custom storage? (/dev/null for cookies in satosa) |
The code in https://github.com/IdentityPython/oidc-op/blob/master/src/oidcop/token/handler.py#L172 doesn't make much sense to me.
Why do we always have to create that jwks? Why do we always write it to disc?
If I understand it correctly this jwks will not be used if that tokens are JWKS.
Also I see no reason to force writing to disc.
Is there something I'm missing?
The text was updated successfully, but these errors were encountered: