-
-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LINE OAuth Strategy #57
Comments
That would be great! Looks like they support OIDC which is very easy to add an integration for. You can take a look at the Azure AD integration (ignoring the tenant logic), and the docs for OIDC base integration: https://github.com/pow-auth/assent/blob/master/lib/assent/strategies/azure_ad.ex For the tests I usually copy values from the provider documentation: https://github.com/pow-auth/assent/blob/master/test/assent/strategies/azure_ad_test.exs#L6 |
@danschultzer Thanks for your inform. I'll read and open PR today. :) |
@danschultzer since LINE Login use alg HS256 for ID Token. After I try passing params to the callback I received error like this:
After read and inspecting code. I found that error come from |
It's work fine if we set def default_config(_config) do
[
site: "https://access.line.me",
authorization_params: [scope: "email profile", response_type: "code"],
openid_configuration: %{
"id_token_signed_response_alg" => ["HS256"],
"issuer" => "https://access.line.me",
"authorization_endpoint" => "https://access.line.me/oauth2/v2.1/authorize",
"token_endpoint" => "https://api.line.me/oauth2/v2.1/token",
"jwks_uri" => "https://api.line.me/oauth2/v2.1/certs"
}
]
end I need to set this manually because well known openid configuration doesn't returned
Do you have any suggestion? |
Add default LINE Login OpenID Connect configuration. The openid configuration dump from /.well-known/openid-configuration plus `id_token_signed_response_alg` to make it work on ID Token with alg HS256. Closes pow-auth#57
Add default LINE Login OpenID Connect configuration. The openid configuration dump from /.well-known/openid-configuration plus `id_token_signed_response_alg` to make it work on ID Token with alg HS256. Closes pow-auth#57
Add default LINE Login OpenID Connect configuration. The openid configuration dump from /.well-known/openid-configuration plus `id_token_signed_response_alg` to make it work on ID Token with alg HS256. Closes pow-auth#57
Add default LINE Login OpenID Connect configuration. The openid configuration dump from /.well-known/openid-configuration plus `id_token_signed_response_alg` to make it work on ID Token with alg HS256. Closes pow-auth#57
Yeah, found out the handling of the response alg was incorrect. It was a bit difficult to understand from the RFC:
But I looked at other OIDC implementations, and setting it as a configuration option seems to be the way to do it. #59 handles that, and I've refactored #58 to use the new configuration option so we don't need to set the open id config manually. I'll get a new release out shortly! |
Add default LINE Login OpenID Connect configuration. The openid configuration dump from /.well-known/openid-configuration plus `id_token_signed_response_alg` to make it work on ID Token with alg HS256. Closes pow-auth#57
It would be good to see it support LINE OAuth Provider (https://developers.line.biz/en/services/line-login/). I can open PR if you're all agree.
The text was updated successfully, but these errors were encountered: