Add a Decrypter for JWE tokens similar to the opensaml Decrypter
Description
Environment
Activity

Philip SmartMay 5, 2023 at 1:19 PM
Created a JWETokenDecrypter for decryption.

Philip SmartAugust 23, 2022 at 2:55 PM
Updated the BasicJOSEObjectCredentialResolver
to allow for an extension point for post-processing credentials (like the SAML BasicProviderKeyInfoCredentialResolver
).
Updated the LocalJOSEObjectCredentialResolver
to implement the post-processing credentials extension point (similar to the LocalKeyInfoCredentialResolver
). The resolver attempts to find local credentials based on matching public keys (with or without a ‘kid’ if available), in addition to local credentials resolved from ‘kid’ alone. Both are added to a list of returned credentials - duplicate credentials (same public and private keys) are removed.
Removed the ‘kid’ criterion from the JWTDecrypter, because that is now handled by the LocalJOSEObjectCredentialResolver
specifically, rather than being applied across all resolvers.

Philip SmartAugust 4, 2022 at 2:55 PM
I've changed over the StaticJOSEObjectCredentialResolver
to be a CollectionJOSEObjectCredentialResolver
as it is filterable based on the EvaluableCredentialCriterion
, which is more inline with the CollectionCredentialResolver
.
I've added a LocalJOSEObjectCredentialResolver
which extends the BasicJOSEObjectCredentialResolver
and hence AbstractCriteriaFilteringCredentialResolver
. For now it just calls the local collection credential resolver mentioned above. It currently filters credentials based on usual algorithm parameters and 'kid' if one exists (built as criteria in the JWTDecrypter
class). I now need to optionally resolve and filter private keys based on any corresponding public keys found by the BasicJOSEObjectCredentialResolver
in the JOSE header ('jwk' or fetched from 'jku'). It is possible that only the 'kid' is defined, so we must also resolve those local credentials without having a corresponding public key to match.
Of note, for encryption, we (the OIDC OP and RP) do not seem to support adding the public key to the JOSE header, only the ‘kid’, maybe we should. I added in a ticket in case it will be useful at some point

Philip SmartJuly 15, 2022 at 1:43 PM
All key management modes have the following criterion:
KeyUsage
KeyID (if present)
JOSEObject included - not used atm.
I’ve added the following criterion specific to the following key management modes:
Direct Encryption. As the RP can resolve the actual encryption key, we can filter on:
Encryption KeyAlgorithm e.g. AES.
KeyLength
Key Encryption. We do not validate the un-encrypted key, the Nimbus decrypted does.
KeyAlgorithm from key management mode ('alg') algorithm e.g. RSA for
RSA-OAEP
Key Wrapping. We do not validate the un-warpped key, the Nimbus decrypted does.
KeyAlgorithm from key management mode ('alg') algorithm e.g. AES for
A128KW
KeyLength - extracted from the algorithm e.g. 128 bit for A128KW
Key Agreement
Not yet working.
Credentials from the various resolvers are filtered against these by the AbstractCriteriaFilteringCredentialResolver.
The JWT decrypted class still contains further and slightly overlapping JOSE Header v credential (albeit a filtered down set) validation.

Philip SmartJuly 14, 2022 at 4:28 PM
Although I need to look at which algorithm is forming the criteria. WIP.
The OP uses a decryption Action for decrypting JWE request objects. The RP will need to deal with decrypting id_tokens and user info JWTs. I think it makes sense to extract the decrypting stuff from the OP and put it in common as a Decrypter type (like the SAML type). Then reference it from a decryption action in the RP (and later OP).