Pinned issues
Issues
- 3
well-known URLs not accessible from `Provider`
#424 opened by tfahrenreich - 2
cacheing well-known files
#436 opened by amir4895 - 4
Build broken since go-oidc/v3 v3.10.0 which upgraded to go-jose/v4 "undefined: max"
#435 opened by timmalich - 0
- 5
Figure out a strategy for handling Azure
#344 opened by ericchiang - 3
`RemoteKeySet` stores and reuses initial context
#428 opened by zakcutner - 2
- 5
id token signed with unsupported algorithm Error (error at traefik-forward-auth)
#429 opened by AdriDevelopsThings - 1
- 1
Microsoft nonce and state doesn't match
#366 opened by onattech - 4
- 1
Error in parsing remoteKeySet endpoint
#422 opened by s1ovac - 7
- 3
Upgrade go-jose to fix CVE-2024-28180
#417 opened by bcandeias - 1
Bump actions/checkout@v3, actions/setup-go@v4
#391 opened by arukiidou - 1
Test with go 1.20/ go 1.21
#388 opened by arukiidou - 4
CVE-2020-9283
#367 opened by pure-jliao - 2
- 2
[question] problems inside of docker
#412 opened by ghstahl - 1
Access blocked: Authorization Error
#411 opened by MikeMwita - 2
Inherit Provider http client settings in calls
#402 opened by p53 - 3
- 1
Access Denied
#403 opened by Gartito - 2
Support for multiple client IDs in the verifier
#397 opened by aramase - 1
- 0
Setting SameSite on the session cookie?
#398 opened by eliben - 3
How to use UserInfo?
#392 opened by tamis-laan - 2
using http instead of https?
#386 opened by tamis-laan - 2
Add Scope value predefined in the specification (profile, email, address, phone)
#385 opened by arukiidou - 2
Backport PR 249 to 2.x stream?
#383 opened by tstephen-relx - 4
Add custom headers
#382 opened by p53 - 5
Support verifying access tokens provided from Client Credential Flow or Resource Owner Password Flow
#379 opened by miner46er - 1
No way to check if server supports UserInfo
#373 opened by crawshaw - 4
Retry RemoteKeySet#updateKeys on error
#372 opened by punkeel - 3
Non-expiring JWT is rejected as expired
#371 opened - 0
OpenID Connect Federation support
#370 opened by ericchiang - 5
Verify azp claim
#355 opened by manjinder-mckc - 4
Non-obvious behavior with long lived `oidc.Provider` objects: `remoteKeySet` caches original context
#339 opened by kuttas - 3
Use context in new requests
#362 opened by argenta-quanto - 3
- 1
Request to Azure AD's open-id config occasionally fails
#358 opened by weeco - 1
Add oidctest package
#345 opened by ericchiang - 2
Add device flow authorization support
#357 opened by sealbro - 1
Create a reusable server for OIDC flow in CLIs
#354 opened by jlewi - 1
How to force re-authentication?
#353 opened by patrickjane - 6
- 4
Verify calls jose.ParseSigned twice
#346 opened by horpto - 1
- 1
issuer did not match the issuer returned by provider, expected "https://xxxxx.com" got "https://xxxxx.com/"
#338 opened by shuaiganzi - 2
IDTokenVerifier from Provider
#335 opened by mitar