Great, thanks Filip!
toggle quoted messageShow quoted text
On Thu, Mar 31, 2016 at 9:50 PM, Filip Hanik <fhanik(a)pivotal.io> wrote:
yes, they are always returned.
introducing an option sounds like a good idea for the systems that wish to
turn it off, thanks for the idea.
On Thu, Mar 31, 2016 at 1:39 PM, Guillaume Berche <bercheg(a)gmail.com>
Thanks Filip for your answer. Wouldn't it make sense to progressively
change this behavior, possibly controlled by a configuration option to give
clients time to handle this incompatible change?
Scanning quickly through the code I suspect the username and email fields
are systematically returned in the access token, regardless of the presence
of the openid scope (I still have to double check by actually testing it),
therefore disclosing some user identity without his/her consent.
On Thu, Mar 31, 2016 at 3:03 PM, Filip Hanik <fhanik(a)pivotal.io> wrote:
The access token used to double down as an identity token before OpenID
Connect was standardized, now that we have implemented id_token, we don't
really need it. but removing it would cause an backwards incompatible
On Thu, Mar 31, 2016 at 6:50 AM, Guillaume Berche <bercheg(a)gmail.com>
I wonder the rationale for apparenty uaa-specific  user-related
fields in the access token (username, email ) while they are now
returned in a standard maneer in the openidconnect id token.
Is it something that would change in the future ( seemed similar
decoupling) ? Or is it a standard practice that avoids clients to request
the idtoken to get access to basic user identity ?
Thanks in advance,
ps: please let me know if such questions are better suited for a GH
issue on the UAA repo.
Some of these fields are described in the JSON web tokensspecification. However, the vendor may add additional fields, or
attributes, to the token itself.