-
Notifications
You must be signed in to change notification settings - Fork 388
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MSC2965: OAuth 2.0 Authorization Server Metadata discovery #2965
base: main
Are you sure you want to change the base?
Conversation
Are any other examples planned? I’m using Ory for several apps that I’d like to also connect together with Matrix. It also strikes me as a conveniently lightweight example for Matrix, which also aligns well with Dendrite since it’s in Go. |
@erlend-sh Good suggestion, thank you - I've added element-hq/oidc-playground#3 to track this. |
This removes the depdency on OIDC specs
@Tachi107 This is a really good point! Unfortunately, the RFC states that applications must not use the general I've reworked the MSC to instead expose the authorization metadata directly as a C-S API endpoint |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
overall looks good to me - just a few (hopefully) easily correctable concerns
MSCs proposed for Final Comment Period (FCP) should meet the requirements outlined in the checklist prior to being accepted into the spec. This checklist is a bit long, but aims to reduce the number of follow-on MSCs after a feature lands. SCT members: please check off things you check for, and raise a concern against FCP if the checklist is incomplete. If an item doesn't apply, prefer to check it rather than remove it. Unchecking items is encouraged where applicable. Checklist:
|
Implementation lgtm. Concerns are relatively minor as well: @mscbot fcp merge |
Team member @mscbot has proposed to merge this. The next step is review by the rest of the tagged people: Concerns:
Once at least 75% of reviewers approve (and there are no outstanding concerns), this will enter its final comment period. If you spot a major issue that hasn't been raised at any point in this process, please speak up! See this document for information about what commands tagged team members can give me. |
Co-authored-by: Travis Ralston <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
read-up-to marker
(thanks for keeping these updated)
|
||
## Proposal | ||
|
||
This introduces a new Client-Server API endpoint to discover the authorization server metadata used by the homeserver. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we include a rationale for why we don't hardcode the endpoint URLs to be under a /_matrix/oauth2
scheme? We still need the metdata discovery for other fields, so to an extent there is a question as to "why not", but still.
Rendered
Status:
Dependencies:
Clients and homeservers currently implement an older version of this proposal, and need to be updated:
/auth_metadata
endpoint defined in MSC2965. element-hq/synapse#18093/auth_metadata
API matrix-js-sdk#4626SCT:
tickyboxes
checklist