OIDC client Redirect URIs validation #12376
Replies: 1 comment
-
|
I am not entirely familiar with the standard and best practices, but you should be able to enforce restrictions through client policies. At the least, not using wildcard redirect URIs is explicitly mentioned as something you can enforce using policies. As to why the server supports it, I would argue that unless it is specifically against standard, the server should allow features in order to be compliant. If an administrator for whatever reason needs some functionality, they should be able to use Keycloak even if it would go against good practices (again, good practices are not part of the RFC). The service should allow people to decide how to use their systems. This being said, I think the points you mentioned are valid. If possible, a stricter default configuration (e.g., implemented as a toggle, or some generally recommended policies) would be greatly appreciated, since administrators are also human and can make mistakes / forget some configuration. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Keycloak redirect URIs in OIDC client can be without schema. Denylist schemas are only 'data' and 'javascript'.
OIDC Authentication Request specification states about redirect_uri:
This is enhanced by OAuth 2.0 Security Best Current Practice.
Taking all these into account we want to ask :
Beta Was this translation helpful? Give feedback.
All reactions