Tim Nolte
Tim Nolte
I should also mention that I have all of my Meross devices completely disconnected from Meross Cloud and only have them setup locally with a local MQTT, or just IP...
What IDP are you using? This is interesting as I've configured the plugin for testing with at least 5 different IDPs and have never seen this error. I will definitely...
Just noting that the real issue is that the tokens response `expires_in` attribute is defined as an optional attribute. https://openid.net/specs/openid-connect-basic-1_0.html#TokenOK > expires_in > OPTIONAL. Expiration time of the Access Token...
I'm not really sure that I'm OK with making this sort of change. There is fallback logic intended to go down a path in order to successfully create users. When...
@Glowsome so I understand what you are talking about. My issue, and this is the issue with all WordPress plugins, is that what you are proposing is changing a big...
@Glowsome well yes, that's what I was talking about in my last comment. The thing though is that accomplishing this change in logic is already possible via the hooks we...
@Glowsome excellent debugging. I will have to do some testing against some of my available IDPs. What is concerning is that neither of the OIDC documents, [OpenID Connect Basic Client...
@Glowsome I checked the debug logs of my Keycloak IDP responses and I don't see `scope` in the responses. I will say that any IDP implementation can meet full specs...
@Glowsome so checking the responses in the plugin debug logs from my Amazon Cognito instance I'm also not seeing `scope` in the responses. I'm going to create a client configuration...
@Glowsome so yeah, I've ran through both Keycloak & Amazon Cognito with the OIDC Debugger and neither return the `scope` attribute. I went looking and according to the [Microfocus Access...