Fraunhofer-AISEC/omejdn-server
Omejdn is an OAuth2/OpenID connect server for IoT devices which use their private keys to request OAuth2 access tokens in order to access protected resources and websites or apps which retrieve user attributes.
RubyApache-2.0
Issues
- 1
- 0
The ```resource_owner.attributes``` field used by ```filter_scopes``` is not a ```Hash```
#77 opened by IcarusCoding - 1
- 2
Features and Specification
#73 opened by SebastianOpriel - 4
Invalid request: Content longer than specified
#69 opened by ndr-brt - 1
Bug in KEYS_LOAD_ALL event of DefaultKeysDB
#66 opened by spetrac - 0
Logout URL formatting issue
#65 opened by bellebaum - 5
- 1
Simpler Certificate File Names
#37 opened by bellebaum - 4
How to request an access token?
#51 opened by sebplorenz - 0
Respect `response_mode` in error responses
#54 opened by bellebaum - 0
Sanitize scopes in Session
#55 opened by bellebaum - 10
- 2
- 1
Rethink Logouts
#58 opened by bellebaum - 4
Certificate Bound Access Tokens
#38 opened by bellebaum - 0
Show requested Claims to User
#56 opened by bellebaum - 0
Client Certificate Revocation Checks
#48 opened by bellebaum - 0
Secured Authorization Requests
#31 opened by bellebaum - 1
- 1
Misleading documentation
#40 opened by aetxeberriasqs - 3
Separate User selection from authentication
#33 opened by bellebaum - 0
- 1
Cache-Control Header missing
#27 opened by bellebaum - 2
- 7
Request-Provided Claim Values Support
#3 opened by milux - 4
HTTP-OPTION Requests result in Error
#18 opened by SebastianOpriel - 7
Wrong filename for File.read
#19 opened by SebastianOpriel - 3
Static reference to yaml user backend.
#20 opened by SebastianOpriel - 3
User selfservice API
#16 opened by schanzen - 3
OAuth2 resource indication
#8 opened by schanzen - 0
Write tests for JWT client assertions
#5 opened by schanzen - 1
Adding edit rights to specific attributes
#7 opened by bellebaum - 1