-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support pre-authorized code grant #225
Comments
Will Pre-Authorized Code Flow be implemented in this Issuer? I studied the python version but I appreciate more the approach using an external authorization server. Under the above preliminary evaluation of needs, do you think will be viable a solution in which the issuer offer a pre-authorized form to insert data required by the credential subject without retrieving data from the authorization server? |
Dear @dariocast The implementation of the Pre-Authorized Code Flow is not currently in the immediate plans/priorities. Keep in mind that especially for HAIP this flow could be removed. Having said this, my analysis above is focused on the OpenId4VCI aspects. To my understanding (spec-wise) it is a viable option, since the specification provides all that is needed (multiple authorization servers, specific authorization server per flow) for the Credential Issuer. Implementation wise, I also think is more or less straightforward. Logically, two components are required:
Minimal Authorization Server:
Pre-Authorization Components
Finally, a remark for the source from which the credential issuer retrieves the data needed to issue a credential. Usually the term used is "Authentic Source". The Authentic Source could be anything a database or another service as long as there is a way to associate an access_token to the data of the specific holder. In the current implementation we use as "Authentic Source" for PID data kept to the user's profile in Keycloak. Yet this is not an absolute requirement. Merely a convenient implementation. |
Currently, the issuer supports only the authorization code grant, given that by design it has been implemented as a resource server that is protected by any of the shelf authorization server.
To support pre-authorized code grant, under the above constraints, the following would be needed:
authorizations_servers
claimaccess_token
issued by either authorization serverImplementation
There are two possible ways to implement the above.
The text was updated successfully, but these errors were encountered: