-
Notifications
You must be signed in to change notification settings - Fork 25.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenID Connect realm should support more client authentication methods #54582
Comments
Pinging @elastic/es-security (:Security/Authentication) |
Hi, Support of PKCE flow (Authorization Code flow extension) would be also a great asset as it's more secure and now widely recommended. |
Thank you for the feedback @saragri31, PKCE is designed to help public clients ( i.e. RPs that are not able to securely store a client id and client secret ). In the elastic stack case, |
Hi @jkakavas |
Hi @jkakavas are there any plans on supporting PKCE authorization flow? |
We would like to support PKCE for the authorization code flow eventually but since in openid connect and for non public clients this offers little additional security value, it is not currently high in our roadmap. You can subscribe to this thread and we'll make sure to update it when we start working on it. cc @bytebilly |
We have added support for |
Client Authentication methods are used by OICD Clients to authenticate to the Authorization Server when using the Token Endpoint. We currently support only
client_secret_basic
See https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication
The text was updated successfully, but these errors were encountered: