+1, it would be great to have a standard plugin for that.
We ended up coding our own very simple which basically just checks for the Authorization Bearer token and if not cached does an Introspection against the OAuth AS to validate it (we handle the access token as opaque). Once validated the Introspection result is injected into a X-Introspection header so the actual Resource Server (RS) can access it. The RS does have an IP table (whitelist) to validate that indeed requests with such X-Introspection header are coming from Kong's plugin.
One complication particular to us is that some RSes (legacy, can't change the code) may need specific custom headers derived from the Introspection so may still need a custom plugin after the generic one. :(
Note that we didn't put the OAuth AS behind Kong so our clients exercise the normal OAuth protocol to obtain the access token, our plugin just validates the incoming requests. I wonder now if from the plugin perspective it would be advantageous to have the AS behind Kong. Oh, maybe it could cache the AS provided tokens so it doesn't have validate it later.... Introspection??
Regards,
Luiz