Hi all,

We have a requirement for using encrypted_id_token which is signed using
the application's certificate. But we have some issues when using
encrypted_id_tokens during OIDC logout.
.
Use Case is the following.

1.  An application is using encrypted id_token  due to security measures.
This id_token is encrypted using the application's certificate.
2.  Once log out from the application it needs to redirect the user to end
application
3.  To achieve 2; the application must send the plain text id_token as
id_token_hint.  Because the IDP is using td_token to identify the
application.

We could find the following possible solutions

1. Make  id_token_hint is not required to redirect to the application. But
we use id_token_hint to identify the RP-initiated-logout. From the
id_token_hint, we derive the client_id. What is the best approach to
identify the client during logout?

2. Ask from application to encrypt the decrypted token from
idp-certificate. Then in the logout flow, idp decrypts & verifies the
token.  This adds more overhead for application well.

Any thoughts on how to handle encrypted id_token_hint for OIDC logout?

Appreciate your suggestions on this.

Thank you for your time,
Piraveena
-- 
*Piraveena Paralogarajah*

*Blog:* https://medium.com/@piraveenaparalogarajah
*LinkedIn*: https://www.linkedin.com/in/piraveena-paralogarajah
<https://www.linkedin.com/in/piraveena-paralogarajah>
_______________________________________________
specs mailing list
sp...@lists.openid.net
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to