Redirect URI Wildcard support #1305
Replies: 1 comment 2 replies
-
Can you share the part of the specifications that would be violated? Appending a query string to the redirect URL is a very common practice in order to remain stateless and be able to ultimately redirect the user-agent to the original resource that triggered the authentication. And it can't be done without wildcard support. This is supported by Keycloak (OIDC) and FusionAuth (OAuth 2) to name only the two ones that I tested before answering. So, if this violates OIDC and OAuth 2, these two projects actually violates the specification. Which is possible but unlikely. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Note
Author: @panva
Target version: ^9.0.0
Warning
No guarantees this is bug-free, if you find a bug please comment on the discussion
Caution
This violates both the OpenID Connect specification and OAuth 2.0 Security Best Current Practice and opens up your Relying Parties as Open Redirectors during many documented OAuth 2.0 attacks. Its only practical use-case is for development purposes and as such is not recommended for any production deployment.
redirect_urisInstall the
wildcardandpslpackages.Update whatever file holds your provider, e.g.
index.jswhere the provider instance Client prototype needs to be changed.post_logout_redirect_urisSimilar to the above with the same recommendation not to use this in any other environment other than development, the only things that change are metadata property names (
post_logout_redirect_uris), client property on which the allow list is (postLogoutRedirectUris), and the client method called (postLogoutRedirectUriAllowed).Beta Was this translation helpful? Give feedback.
All reactions