Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

API Response 401 #8

Open
SkyQuant opened this issue Apr 4, 2016 · 16 comments
Open

API Response 401 #8

SkyQuant opened this issue Apr 4, 2016 · 16 comments

Comments

@SkyQuant
Copy link

SkyQuant commented Apr 4, 2016

I fetched token which is also saved in local storage, but can't authorize for API call. Suppose I have to manually realize auth logic writing something to Startup.cs?

@capesean
Copy link
Owner

capesean commented Apr 4, 2016

I've just run into this issue myself. Will let you know when it's fixed.

@SkyQuant
Copy link
Author

SkyQuant commented Apr 4, 2016

@capesean, thanks in advance. Any assumptions in the moment?

@capesean
Copy link
Owner

capesean commented Apr 4, 2016

@shima20
Copy link

shima20 commented Apr 6, 2016

If I wanted to run the openiddict for jwt in production, is there a way to ensure that it doesn't get broken like this?

@capesean
Copy link
Owner

capesean commented Apr 6, 2016

@shima20 you'd need to pin your versions in project.json. i.e. instead of using versions like 1-0-0-* you'd need to pin them to the exact versions that you have that work, like 1-0-0-rc2-21440.

@shima20
Copy link

shima20 commented Apr 6, 2016

@capesean good to know thanks! is there any way to tell which version is a good working version before this bug?

@capesean
Copy link
Owner

capesean commented Apr 6, 2016

@shima20 you'll have to work that out for yourself, I'm afraid. I haven't been keeping track. It's a little tricky because you also have to pin the dependencies, i.e. the other packages that OpenIddict relies on also have to be pinned.

@kevinchalet
Copy link
Contributor

FYI, the "missing signature" bug should be fixed soon by @brentschmaltz (who works for the MSFT Azure AD team, in charge of the JWT library OpenIddict relies on): AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet#364

@brentschmaltz
Copy link

@PinpointTownes Should be in today, sorry for the hassle.
thanks Pinpoint.

@shima20
Copy link

shima20 commented Apr 6, 2016

good to hear @brentschmaltz , looking forward to the fix!

@kevinchalet
Copy link
Contributor

@brentschmaltz you're welcome! Thanks for the quick fix 👏

@shima20
Copy link

shima20 commented Apr 7, 2016

@brentschmaltz is there anything i need to do now? i tried again this morning and im still getting the same issue.

@kevinchalet
Copy link
Contributor

@shima20
Copy link

shima20 commented Apr 8, 2016

@PinpointTownes guess we are still waiting for it to be updated?

@kevinchalet
Copy link
Contributor

The aspnet-contrib feed is now mirroring the Azure AD feed and ASOS was just updated to use the latest IdentityModel packages: aspnet-contrib/AspNet.Security.OpenIdConnect.Server@e3a8781.

The JWT issue you're seeing should disappear when updating your packages.

@shima20
Copy link

shima20 commented Apr 12, 2016

Thank you! It is in fact working again.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants