--
You received this message because you are subscribed to the Google Groups "dex-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dex-dev+u...@googlegroups.com.
To post to this group, send email to dex...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/dex-dev/3531b1a0-618c-439e-8c37-84b0b0ebab07%40googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/dex-dev/a063bc1c-1c9d-4ac9-ab0b-ff95ef42e8ed%40googlegroups.com.
Since dex doesn't use access tokens, there's no reason to support the client credentials grant because there's nothing useful in the OAuth2 token response for just a client.
I'm not aware of standards for issuing OpenID Connect id_tokens for a client and not a client/end user pair.
There are plenty of frameworks for service to service authentication (e.g. https://spiffe.io). Maybe one of those would suit your use case better?
Eric
Since dex doesn't use access tokens, there's no reason to support the client credentials grant because there's nothing useful in the OAuth2 token response for just a client.
I'm not aware of standards for issuing OpenID Connect id_tokens for a client and not a client/end user pair.
There are plenty of frameworks for service to service authentication (e.g. https://spiffe.io). Maybe one of those would suit your use case better?
Eric