together with the 1.9.3-SNAPSHOT build works like a charm.
I've used the play-pac4j-java-demo to test it. I've changed the OpenId Connect code to:
....
OIDCProviderMetadata meta = null;
try
{
Issuer issuer = new Issuer("https://accounts.google.com");
List<SubjectType> subjectTypes =Arrays.asList(SubjectType.PUBLIC);
URI jwkSetURI = new URI("https://www.googleapis.com/oauth2/v3/certs");
List<ResponseType> responseTypes = Arrays
.asList(ResponseType.parse("code"), ResponseType.parse("token"), ResponseType.parse("id_token"),
ResponseType.parse("code token"), ResponseType.parse("code id_token"), ResponseType.parse("token id_token"),
ResponseType.parse("code token id_token"), ResponseType.parse("none"));
meta = new OIDCProviderMetadata(issuer, subjectTypes, jwkSetURI);
meta.setAuthorizationEndpointURI(new URI("https://accounts.google.com/o/oauth2/v2/auth"));
meta.setTokenEndpointURI(new URI("https://www.googleapis.com/oauth2/v4/token"));
meta.setUserInfoEndpointURI(new URI("https://www.googleapis.com/oauth2/v3/userinfo"));
meta.setIDTokenJWSAlgs(Arrays.asList(JWSAlgorithm.RS256));
meta.setResponseTypes(responseTypes);
meta.setScopes(Scope.parse(Arrays.asList("openid", "email", "profile")));
meta.setTokenEndpointAuthMethods(Arrays.asList(ClientAuthenticationMethod.parse("client_secret_post"),
ClientAuthenticationMethod.parse("client_secret_basic")));
meta.setClaims(Arrays.asList("aud", "email", "email_verified", "exp", "family_name", "given_name", "iat", "iss", "locale", "name",
"picture", "sub"));
meta.setCodeChallengeMethods(Arrays.asList(CodeChallengeMethod.PLAIN, CodeChallengeMethod.S256));
}
catch (URISyntaxException e)
{
e.printStackTrace();
}
catch (ParseException e)
{
e.printStackTrace();
}
oidcConfiguration.setProviderMetadata(meta);
I've had no issues with the IdTokenValidator so far, but am not quite sure where that kicks in.
Hope this helps. I'll now try to configure it correctly for my WSO2 server.
Thanks again for your quick help.
/Richard
Op woensdag 28 september 2016 14:17:24 UTC+2 schreef Richard: