Skip to content
#

oidc

Here are 668 public repositories matching this topic...

Librechain
Librechain commented Oct 15, 2021

Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).

While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit

feat help wanted good first issue
next-auth
hinsxd
hinsxd commented Mar 14, 2022

Description 📓

https://github.com/nextauthjs/next-auth/blob/7636de4a340380c50dea39be3854d9b7d69be62b/packages/next-auth/src/next/middleware.ts#L84

Middleware is calling getToken directly without providing any decode methods. By getToken() uses jwtDecrypt from jose package, and it will probably throws error when the JWT is not signed in the same way. It will throw error when we p

enhancement good first issue
angular-auth-oidc-client
cedbesafilm
cedbesafilm commented Dec 7, 2021

Describe the bug
If the environment (in my case the stage environment) is not setup as a a secure origin the library break up cause of the crypto library is not in window object

To Reproduce
Steps to reproduce the behavior:

  1. A server work on http that is setup as 'insecure origin'
  2. Start the login sequence

Expected behavior
Warning on library loading that check secure or

DimalChandrasiri
DimalChandrasiri commented Jan 25, 2021

Describe the issue:
The links not show hover states on hover on the getting started page.

How to reproduce:

  1. Navigate to getting started page
  2. hover over any link

Expected behavior:
Should indicate hover state for links

improvement bug good first issue ux
zitadel
livio-a
livio-a commented Nov 30, 2021

After creating a custom login policy, the active identity providers are still listed from default. Same ist for MFA and 2FA, ...

From the screenshots below, you can see that the new policy is loaded after creation and reset. But only the policy itself and not the identity providers and factors:
![image](https://user-images.githubusercontent.com/9405495/143998582-86d03161-287f-4448-b0e4-feca882

bug good first issue frontend angular

Improve this page

Add a description, image, and links to the oidc topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the oidc topic, visit your repo's landing page and select "manage topics."

Learn more