Open RafterGit opened 4 years ago
If you are using the OIDC_OP_JWKS_ENDPOINT
endpoint then you probably don't need the OIDC_RP_IDP_SIGN_KEY
. The endpoint is used to fetch the public key. And indeed OIDC_RP_IDP_SIGN_KEY
should contain your OIDC provider's public key.
Be careful with the format of the key, it's sensitive and defaults byte-like key which in turn fails : https://github.com/mozilla/mozilla-django-oidc/issues/505#issuecomment-2257988592
Hello ,
I'm currently testing my local environment against an OIDC provider. Via postman, I am able confirm that all of these endpoints are correct and I'm able to hit the USER_INFO endpoint with a bearer token created by the provider.
However, though I'm able to see in the logs that my service is using
mozilla_django_oidc
and successfully getting a response from the USER_INFO endpoint( json response with user profile info , etc.) . My application stops on this error:--
and my requirements.txt:
Looking up those who've come across similar issues have suggested I use my public cert in lieu of my private cert. Swtching this setting
OIDC_RP_IDP_SIGN_KEY
to user my public cert results in the following error: