authlib icon indicating copy to clipboard operation
authlib copied to clipboard

The ultimate Python library in building OAuth, OpenID Connect clients and servers. JWS,JWE,JWK,JWA,JWT included.

Results 186 authlib issues
Sort by recently updated
recently updated
newest added

**Describe the bug** When using the exactly same credentials and API call signatures, the requests client could access protected resources from OAuth protected API, while the signature of requests made...

client

Hi, is there a way to disable the nonce validation on client-side? I ask this question because, if I understand correctly, that parameter is optional, differently from the state which...

question
role:client

**Describe the bug** The [IntrospectionToken](https://github.com/lepture/authlib/blob/master/authlib/oauth2/rfc7662/models.py#L4) class doesn't seem to implement the [TokenMixin](https://github.com/lepture/authlib/blob/9ae4db94b10767452da55183d265a8a2acf4d441/authlib/oauth2/rfc6749/models.py#L174) in it's current form, and looks like it still implements the older 0.15 TokenMixin

role:authorization_server

My OAuth provider has OAuth1. For `fetch_request_token` method, the provider requires an extra authorization header parameter `oauth_callback="oob"` like the following: ``` Authorization: OAuth realm="",oauth_callback="oob", oauth_signature="xxx", oauth_nonce="xxx", oauth_signature_method="HMAC-SHA1",oauth_consumer_key="xxx", oauth_timestamp="1273254425" ``` Do...

[Section 2 of RFC 7009](https://datatracker.ietf.org/doc/html/rfc7009#section-2) says: "The authorization server first validates the client credentials (in case of a confidential client) and then verifies whether the token was issued to the...

[Section 3.1 of the RFC6749](https://datatracker.ietf.org/doc/html/rfc6749#section-3.1) says "Request and response parameters MUST NOT be included more than once." Add a method to the OAuth2Request object to obtain all the values for...

A small fix to the documentation of `authlib.oauth2.rfc9068.JWTIntrospectionEndpoint` **What kind of change does this PR introduce?** (check at least one) - [x] Bugfix - [ ] Feature - [ ]...

**What kind of change does this PR introduce?** (check at least one) - [ ] Bugfix - [ ] Feature - [ ] Code style update - [ ] Refactor...

Fix https://github.com/lepture/authlib/issues/622. See https://github.com/lepture/authlib/issues/622#issuecomment-2049294579 for more context about the proposed solution. The PR deletes old states from the cookie to avoid reaching the 4kb limit. cc @lepture @frozturk

**Describe the bug** According to https://www.rfc-editor.org/rfc/rfc7519.html#section-4.1.6 the `iat` field should be a numeric field. Creating a token with `iat:true` passes validation. This looks to be because [`_validate_numeric_time`](https://github.com/lepture/authlib/blob/98d8a923cb8fbb785e85536d0c3a7a6447be0782/authlib/jose/rfc7519/claims.py#L226-L227) returns True for...

jose