Open mlazowik opened 9 months ago
I'm not 100% sure whether this is something that pyoidc should handle. I'm adding the issue already in case for someone else it's obvious. If there are no responses I'll research more and update when I find the time.
pyoidc
In particular Keycloak v23 implemented that RFC and now our app is receiving two iss keys in the url params in auth response, which ends up throwing TooManyValues from https://github.com/CZ-NIC/pyoidc/blob/0e30cd297a5935eebef6b8b945f9a25f0b45a060/src/oic/oauth2/message.py#L296
iss
TooManyValues
For now we'll be using the Exclude Issuer From Authentication Response compatibility option in Keycloak.
Exclude Issuer From Authentication Response
This should probably be implemented as an extension message...
I'm not 100% sure whether this is something that
pyoidc
should handle. I'm adding the issue already in case for someone else it's obvious. If there are no responses I'll research more and update when I find the time.In particular Keycloak v23 implemented that RFC and now our app is receiving two
iss
keys in the url params in auth response, which ends up throwingTooManyValues
from https://github.com/CZ-NIC/pyoidc/blob/0e30cd297a5935eebef6b8b945f9a25f0b45a060/src/oic/oauth2/message.py#L296For now we'll be using the
Exclude Issuer From Authentication Response
compatibility option in Keycloak.