Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enabling third-party IDP token exposure through IS #20031

Open
indeewari opened this issue Mar 18, 2024 · 1 comment
Open

Enabling third-party IDP token exposure through IS #20031

indeewari opened this issue Mar 18, 2024 · 1 comment
Assignees

Comments

@indeewari
Copy link
Contributor

indeewari commented Mar 18, 2024

Is your feature request related to a problem? Please describe.
IS can act as the primary identity provider(IdP) for the business application that is used for managing the primary user base and orchestrating the login flow of the application. There are scenarios in which consumer users of the applications can authenticate via 3rd parties with federation via IS.
This business application also requires the users to authorize the application to consume APIs from these 3rd parties which manage the user’s resources. The third-party resource servers are protected by their trusted authorization servers. These authorization servers do not have token exchanging capabilities along with obtaining the user consent at the token exchange. This scenario requires the application to prompt for multiple user logins and hinders the user experience.

Describe the solution you would prefer
IS will expose the third-party access token and the refresh token to the business application. In fact, IS won't handle the refresh token mechanism internally.

Additional context
Without the capability, the application developers will have to prompt the user to login through multiple IDPs for a single user flow hindering the user experience.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant