Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support with Google OAuth2 #289

Open
tomberek opened this issue Feb 28, 2025 · 1 comment
Open

Support with Google OAuth2 #289

tomberek opened this issue Feb 28, 2025 · 1 comment

Comments

@tomberek
Copy link

While trying to get wiresteward working with Google's implementation of OAuth2, i needed these changes:

master...tomberek:wiresteward:tomberek.google

Not sure if I'm configuring something wrong, or if this is just due to differences in OAuth2 implementation.

@ffilippopoulos
Copy link
Member

Hey @tomberek ! tyvm for raising this issue with a code change proposal.
This code was developed against Okta Oauth2 APIs and it looks like there are differences in the implementation of /introspect endpoint between Okta and Google. We will be happy to keep this open and
work on introducing support for Google as the provider to pass token validation.

Another thing to note here, is that your code seems to introduce a client sercret which is not favourable.
Since Wiresteward is intended to be shipped to different clients for our use cases, we are following the PKCE flow, which seems to be supported by Google too: https://developers.google.com/identity/protocols/oauth2/native-app#step1-code-verifier. Is there a specific reason for wanting to a client secret here?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants