Issues

Select view

Select search mode

 
32 of 32

Support additional refresh token types

Completed

Description

The refresh tokens are currently always encoded as opaque strings that contains all the state information in an internal JSON format, encrypted via DataSealer.

For instance the Italian CIE OIDC federation requires refresh tokens to be in JWT-format. Similarly to access tokens, we could support a refreshTokenType profile configuration option in order to configure refresh token types per relying party.

Ideally the configuration option wouldn’t be limited to opaque and JWT types: it should offer means to inject fully customisable types, optionally exploiting server-side storage for the state.

Environment

None

Details

Assignee

Reporter

Fix versions

Created December 8, 2023 at 1:49 PM
Updated April 11, 2024 at 9:19 AM
Resolved April 11, 2024 at 9:19 AM

Activity

Show:

Henri MikkonenMarch 22, 2024 at 7:50 AM

After discussion with , refactored the bean-injection to the map of serializers and the list of deserializers. This way we make sure that the beans that get injected are prototypes. That may not always be required, but the message handlers may be stateful.

The beans are injected via two factories (new global beans):

  • shibboleth.oidc.RefreshTokenSerializerFactory

  • shibboleth.oidc.RefreshTokenDeserializerFactory

Those can be adjusted with two constructor parameters:

  • id: the id for the bean to be wired

  • allowNonPrototype: whether to allow non-prototype beans, defaults to false. The factory will return null if this is false but the injected bean is not prototype.

Henri MikkonenJanuary 19, 2024 at 6:32 AM

Added two new beans that are wired to the actions dealing with refresh tokens:

shibboleth.oidc.DefaultRefreshTokenSerializationStrategies (in token beans)

  • Map of serialization strategies (keyed with the refresh token type)

  • Serializer: BiFunction<ProfileRequestContext,RefreshTokenClaimsSet,String>

  • Custom map can be wired via idp.oauth2.refreshToken.serializationStrategies -property

shibboleth.oidc.DefaultRefreshTokenDeserializers (in abstract beans)

  • List of deserializers

  • Deserializer: BiFunction<ProfileRequestContext,String,RefreshTokenClaimsSet>

  • Used by token, introspection and revocation flow

  • Custom list can be wired via idp.oauth2.refreshToken.deserializers -property

Henri MikkonenDecember 8, 2023 at 2:01 PM

I drafted a prototype on this by modifying SetRefreshTokenToResponseContext action to be wired with refreshTokenSerializationStrategies: (Map<String, BiFunction<ProfileRequestContext,RefreshTokenClaimsSet,String>>). The key refers to the refresh token type (a new profile configuration option) and value to the bi-function that encodes the given RefreshTokenClaimsSet into a String that’s sent to back to the RP in the token endpoint.

The example bi-function for producing JWT refresh tokens seems to be fairly simple to implement by exploiting PopulateJWTSignatureSigningParametersHandler for building the SecurityParametersContext with SignatureSigningParameters, which is fed to the JWSTokenSigner for signing.

The deserialisation of incoming refresh tokens could be configured in a similar way: with a map of Strings (refresh token types) to (bi-)functions. That would need to be wired to ValidateGrant action (that validates the refresh token grant in the token endpoint) and for AbstractProcessTokenAction to provide compatibility with the introspection and revocation endpoints.

Flag notifications