refined-iron-20465
02/04/2024, 9:38 PMrequested_access_token_audience
should be an array of strings. However, the JSON response from hydra contains "requested_access_token_audience": null
. Thefore deserialization fails in hydra-client-rust. Any idea how to solve this problem?refined-kangaroo-48640
02/06/2024, 3:50 PMrefined-kangaroo-48640
02/12/2024, 12:10 PMrefined-iron-20465
02/27/2024, 3:16 PM.challenge
in the login request and the .login_challenge
in the consent request (in the same flow). The first is a relatively large (1129 Bytes) base64-encoded value and the latter is a smaller (16 Bytes) hex-encoded value. AFAIK they should be equal, when they belong to the same flow.refined-kangaroo-48640
02/27/2024, 3:32 PMrefined-iron-20465
02/27/2024, 4:17 PMconsent_request.login_challenge
) is a different one (the short one), so it's not bound to the user and my mitigation prohibits the user from proceeding.refined-iron-20465
02/27/2024, 4:22 PMrefined-kangaroo-48640
02/27/2024, 5:07 PMrefined-kangaroo-48640
02/27/2024, 5:08 PMconsent_request.login_challenge
should probably contain the long ID, or a hash of the long ID.refined-iron-20465
02/27/2024, 5:08 PMrefined-kangaroo-48640
02/27/2024, 5:09 PMrefined-iron-20465
02/27/2024, 5:09 PMrefined-iron-20465
02/27/2024, 5:10 PMrefined-iron-20465
02/27/2024, 5:16 PMlogin_request.login_challenge
which contains the short ID (different from .challenge
which contains the long ID). Then the IdP has access to the short ID already in the login flow and can match that against the short ID during the consent flow.