Hi Johann, No the spec directly says 'If does not have *per-configured consent*'. Those days when we were implementing this we interpreted per-configured session as 'approve-always' or file based 'skip-consent=true'.
Anyway I will raise this to OIDC community. Thanks, Hasanthi Dissanayake Software Engineer | WSO2 E: [email protected] M :0718407133| http://wso2.com <http://wso2.com/> On Mon, Jul 18, 2016 at 4:11 PM, Johann Nallathamby <[email protected]> wrote: > Hmm.. does the spec say anything related to this. If not better we send a > mail to OIDC community and check this out. But if the compliance tests are > failing lets go ahead with this new behaviour but let's introduce a > property to turn back the old behaviour and make the new the default. > > On Mon, Jul 18, 2016 at 4:05 PM, Hasanthi Purnima Dissanayake < > [email protected]> wrote: > >> Hi All, >> According to the spec [1] when prompt=none the result should as below. >> >>> The Authorization Server MUST NOT display any authentication or consent >>> user interface pages. An error is returned if an End-User is not already >>> authenticated or the Client does not have per-configured consent for the >>> requested Claims or does not fulfill other conditions for processing the >>> request >> >> >> So if we consider a scenario like >> 1. User sends authorization request without any prompt value to the IS >> server >> 2. Server gives the login page >> 3. User provides credentials >> 4. Authentication successful and server returns consent page >> 5. User provides consent as 'Approve' >> 6. User send a authorization request with prompt =none >> >> According to our current implementation it gives an error page with >> consent-required error as the server does not have "trusted_always" in the >> db table or "skipConsent=true" in file. But when executing the OIDC >> compliance test cases in such a scenario it expects this as a successful >> authentication as we have set the consent as approve in the same session. >> >> So if we are doing this we need to skip the consent page if the their is >> a session with consent=approve. Do we need to change our implementation >> according to this? Any suggestions will be highly appreciated. >> >> >> The output of the test case is as below. >> Trace output >> >> >> 0.000497 ------------ AuthorizationRequest ------------ >> 0.000903 --> URL: >> https://210.90.95.XXX:9443/oauth2/authorize?scope=openid&state=hwcw3vhktnBaM99R&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A60746%2Fauthz_cb&response_type=code&client_id=4rYClwGnY4CE_XXAkMCoWuI4mnIa >> 0.000910 --> BODY: None >> 70.472175 <-- >> code=de0696cf-7183-3c31-a13c-92695101e589&state=hwcw3vhktnBaM99R&session_state=927dc2d850b486e4a5d76a5f0d0dd3c1829b4e0007e11e58b1a9fbf17a3fff18._ynyYSwWWERr2-QI1X8sDg >> 70.472683 AuthorizationResponse: { >> "code": "de0696cf-7183-3c31-a13c-92695101e589", >> "session_state": >> "927dc2d850b486e4a5d76a5f0d0dd3c1829b4e0007e11e58b1a9fbf17a3fff18._ynyYSwWWERr2-QI1X8sDg", >> "state": "hwcw3vhktnBaM99R" >> } >> 70.473121 ------------ AccessTokenRequest ------------ >> 70.473556 --> URL: https://210.90.95.XXX:9443/oauth2/token >> 70.473561 --> BODY: >> code=de0696cf-7183-3c31-a13c-92695101e589&grant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A60746%2Fauthz_cb >> 70.473575 --> HEADERS: {'Content-Type': 'application/x-www-form-urlencoded', >> 'Authorization': u'Basic >> NHJZQ2x3R25ZNENFX1hYQWtNQ29XdUk0bW5JYTpBdE8wenhmNjJLb1lhc1lUb2JPR1JYVlJaWHNh'} >> 74.644260 <-- STATUS: 200 >> 74.644479 <-- BODY: >> {"access_token":"399d4582-967f-3083-831e-f5c4a6665e4a","refresh_token":"e9f533c3-a867-3758-8edc-2c10b2be0cd3","scope":"openid","id_token":"eyJ4NXQiOiJObUptT0dVeE16WmxZak0yWkRSaE5UWmxZVEExWXpkaFpUUmlPV0UwTldJMk0ySm1PVGMxWkEiLCJraWQiOiIxNTA4MzI3Zjg1M2RlODkzZWVhYTg2YzIwMTUyNjg5NWQxZTk1MTQzIiwiYWxnIjoiUlMyNTYifQ.eyJhdF9oYXNoIjoiQ1dSTWNFSkNDUURWeUtGMVlDWklmZyIsInN1YiI6ImFkbWluIiwiYXVkIjpbIjRyWUNsd0duWTRDRV9YWEFrTUNvV3VJNG1uSWEiXSwiYXpwIjoiNHJZQ2x3R25ZNENFX1hYQWtNQ29XdUk0bW5JYSIsImF1dGhfdGltZSI6MTQ2ODgzNTEwMCwiaXNzIjoiaHR0cHM6XC9cLzIwMy45NC45NS4yMTU6OTQ0M1wvIiwiZXhwIjoxNDY4ODM5OTQ0LCJpYXQiOjE0Njg4MzYzNDR9.M3Er8G4M05JPXmm-YOsOVcimGrzr9GwSmKeqGQBMTP0ZCpJ9NlFN-SR5HJ9xcH8Tc-dh201euilqPLzkfq2annbIS8V7gkS2ttnryjp0eTDIX3p4gKoLo1HfEARb4iB6r6ovDIzqytYMPacZj5t7uxBxSz2Aiu6qjkNOb5uY7Ss","token_type":"Bearer","expires_in":2056} >> 76.777209 AccessTokenResponse: { >> "access_token": "399d4582-967f-3083-831e-f5c4a6665e4a", >> "expires_in": 2056, >> "id_token": { >> "claims": { >> "at_hash": "CWRMcEJCCQDVyKF1YCZIfg", >> "aud": [ >> "4rYClwGnY4CE_XXAkMCoWuI4mnIa" >> ], >> "auth_time": 1468835100, >> "azp": "4rYClwGnY4CE_XXAkMCoWuI4mnIa", >> "exp": 1468839944, >> "iat": 1468836344, >> "iss": "https://210.90.95.XXX:9443/", >> "sub": "admin" >> }, >> "jws header parameters": { >> "alg": "RS256", >> "kid": "1508327f853de893eeaa86c201526895d1e95143", >> "x5t": "NmJmOGUxMzZlYjM2ZDRhNTZlYTA1YzdhZTRiOWE0NWI2M2JmOTc1ZA" >> } >> }, >> "refresh_token": "e9f533c3-a867-3758-8edc-2c10b2be0cd3", >> "scope": "openid", >> "token_type": "Bearer" >> } >> 76.788640 ------------ AuthorizationRequest ------------ >> 76.789114 --> URL: >> https://210.90.95.XXX:9443/oauth2/authorize?prompt=none&state=AstNRnS88v73aAjI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A60746%2Fauthz_cb&response_type=code&client_id=4rYClwGnY4CE_XXAkMCoWuI4mnIa&scope=openid >> 76.789121 --> BODY: None >> 108.266371 <-- >> code=684a2084-b823-35fc-baed-d73fdb6a9694&state=AstNRnS88v73aAjI&session_state=62a0bd33903999d7245654681f715e9700377e6b5ccaaf84ecb98b40311d8214.9iW0pFCokaZQXs4mZAp1jg >> 108.266883 AuthorizationResponse: { >> "code": "684a2084-b823-35fc-baed-d73fdb6a9694", >> "session_state": >> "62a0bd33903999d7245654681f715e9700377e6b5ccaaf84ecb98b40311d8214.9iW0pFCokaZQXs4mZAp1jg", >> "state": "AstNRnS88v73aAjI" >> } >> 108.268413 ------------ AccessTokenRequest ------------ >> 108.268842 --> URL: https://210.90.95.XXX:9443/oauth2/token >> 108.268848 --> BODY: >> code=684a2084-b823-35fc-baed-d73fdb6a9694&grant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A60746%2Fauthz_cb >> 108.268861 --> HEADERS: {'Content-Type': >> 'application/x-www-form-urlencoded', 'Authorization': u'Basic >> NHJZQ2x3R25ZNENFX1hYQWtNQ29XdUk0bW5JYTpBdE8wenhmNjJLb1lhc1lUb2JPR1JYVlJaWHNh'} >> 109.497011 <-- STATUS: 200 >> 109.497233 <-- BODY: >> {"access_token":"399d4582-967f-3083-831e-f5c4a6665e4a","refresh_token":"e9f533c3-a867-3758-8edc-2c10b2be0cd3","scope":"openid","id_token":"eyJ4NXQiOiJObUptT0dVeE16WmxZak0yWkRSaE5UWmxZVEExWXpkaFpUUmlPV0UwTldJMk0ySm1PVGMxWkEiLCJraWQiOiIxNTA4MzI3Zjg1M2RlODkzZWVhYTg2YzIwMTUyNjg5NWQxZTk1MTQzIiwiYWxnIjoiUlMyNTYifQ.eyJhdF9oYXNoIjoiQ1dSTWNFSkNDUURWeUtGMVlDWklmZyIsInN1YiI6ImFkbWluIiwiYXVkIjpbIjRyWUNsd0duWTRDRV9YWEFrTUNvV3VJNG1uSWEiXSwiYXpwIjoiNHJZQ2x3R25ZNENFX1hYQWtNQ29XdUk0bW5JYSIsImF1dGhfdGltZSI6MTQ2ODgzNTEwMCwiaXNzIjoiaHR0cHM6XC9cLzIwMy45NC45NS4yMTU6OTQ0M1wvIiwiZXhwIjoxNDY4ODM5OTc5LCJpYXQiOjE0Njg4MzYzNzl9.R81RqhJpS_qteUfH_sEQLFYLTbqS5k8GkpM4gaya3rz1yj62OB6ruXOSXFcmTYm11O-5qqJf36FOB1WFfyGNqmfKKy6XIggd6QMCdCh8yhcm8YlDKv_7VUtuFY3O0juLFCN59WEABGcl2sbJTSOGgfcZMHFwFLjKEzAnv8smQEg","token_type":"Bearer","expires_in":2021} >> 109.503787 AccessTokenResponse: { >> "access_token": "399d4582-967f-3083-831e-f5c4a6665e4a", >> "expires_in": 2021, >> "id_token": { >> "claims": { >> "at_hash": "CWRMcEJCCQDVyKF1YCZIfg", >> "aud": [ >> "4rYClwGnY4CE_XXAkMCoWuI4mnIa" >> ], >> "auth_time": 1468835100, >> "azp": "4rYClwGnY4CE_XXAkMCoWuI4mnIa", >> "exp": 1468839979, >> "iat": 1468836379, >> "iss": "https://210.90.95.XXX:9443/", >> "sub": "admin" >> }, >> "jws header parameters": { >> "alg": "RS256", >> "kid": "1508327f853de893eeaa86c201526895d1e95143", >> "x5t": "NmJmOGUxMzZlYjM2ZDRhNTZlYTA1YzdhZTRiOWE0NWI2M2JmOTc1ZA" >> } >> }, >> "refresh_token": "e9f533c3-a867-3758-8edc-2c10b2be0cd3", >> "scope": "openid", >> "token_type": "Bearer" >> } >> 109.515598 ==== END ==== >> >> >> ------------------------------ >> ResultPASSED >> >> >> >> Hasanthi Dissanayake >> >> Software Engineer | WSO2 >> >> E: [email protected] >> M :0718407133| http://wso2.com <http://wso2.com/> >> > > > > -- > Thanks & Regards, > > *Johann Dilantha Nallathamby* > Technical Lead & Product Lead of WSO2 Identity Server > Governance Technologies Team > WSO2, Inc. > lean.enterprise.middleware > > Mobile - *+94777776950* > Blog - *http://nallaa.wordpress.com <http://nallaa.wordpress.com>* >
_______________________________________________ Dev mailing list [email protected] http://wso2.org/cgi-bin/mailman/listinfo/dev
