Details
-
Task
-
Resolution: Obsolete
-
Major
-
None
-
NEW
-
NEW
Description
Part of this task is to:
- Make sure that Keycloak master (currently still before KEycloak 15 release) is able to pass the FAPI conformance testsuite https://openid.net/certification/fapi_op_testing/ . We go for the server tests (OP) for the FAPI. We may possibly obtain the certifications for all the configurations from:
- FAPI 1 Advanced Final (Generic) from https://openid.net/certification/#FAPI_OPs . Possibly all 8 configurations
- Brazil Open Banking (Based on FAPI 1 Advanced Final) from https://openid.net/certification/#FAPI_OPs - We should be able to obtain certifications for first 8 configurations. For the 9th (DCR), there may be some customizations needed on Keycloak side to receive the certification
- FAPI CIBA from https://openid.net/certification/#FAPI-CIBA_OPs . Possibly all 4 configurations.
- After Keycloak 15 release, obtain the certifications
- Acknowledge the FAPI, FAPI CIBA and OpenBanking Brasil certifications obtained (documentation? Blogpost? Something else?)
Attachments
Issue Links
- blocks
-
KEYCLOAK-18457 FAPI CIBA Support
-
- Resolved
-
-
KEYCLOAK-18629 OpenBanking Brazil support
-
- Resolved
-
- is blocked by
-
KEYCLOAK-14380 Support Requesting Claims using the "claims" Request Parameter
-
- Closed
-
- is related to
-
KEYCLOAK-11261 Support to check whether a request object's "aud" indicates keycloak and return appropriate error if not
-
- Resolved
-
-
KEYCLOAK-6767 FAPI (Financial API) Security Profile Support
-
- Closed
-
-
KEYCLOAK-11251 ES256 or PS256 support for Client Authentication by Signed JWT
-
- Closed
-
-
KEYCLOAK-11252 Implement Server Metadata of OAuth 2.0 Mutual TLS Client Authentication
-
- Closed
-
-
KEYCLOAK-11253 Advertise "acr" claim in "claims_supported" Server Metadata
-
- Closed
-
-
KEYCLOAK-11254 Enforce some types of OIDC Hybrid Flow to a client
-
- Closed
-
-
KEYCLOAK-11255 Support to check whether a request object includes "exp" claim and return an appropriate error if not
-
- Closed
-
-
KEYCLOAK-11256 Support to check whether a request object includes "scope" claim and return an appropriate error if not
-
- Closed
-
-
KEYCLOAK-11257 Support to check whether a request object includes "state" claim and return an appropriate error if not
-
- Closed
-
-
KEYCLOAK-11258 Support to check whether a request object includes "nonce" claim and return an appropriate error if not
-
- Closed
-
-
KEYCLOAK-11259 Support to check whether a request object includes "redirect_uri" claim and return an appropriate error if not
-
- Closed
-
-
KEYCLOAK-11260 Support to check whether a request object has expired based on "exp" claim and return an appropriate error if so
-
- Closed
-
-
KEYCLOAK-11262 Support to check whether "nonce" as a query parameter matches "nonce" claim in a request object and return appropriate error if not match
-
- Closed
-
-
KEYCLOAK-11263 401 Status Response on OAuth 2.0 Mutual TLS Client Authentication Error
-
- Closed
-
-
KEYCLOAK-15236 FAPI-RW : Error Response on OAuth 2.0 Mutual TLS Client Authentication Error (400 error=invalid_client)
-
- Closed
-
-
KEYCLOAK-9560 [SPIKE] Evaluate FAPI
-
- Resolved
-
-
KEYCLOAK-13720 Specify Signature Algorithm in Signed JWT Client Authentication
-
- Closed
-
1.
|
Pass All Conformance Tests for FAPI R/W OP w/ MTLS |
|
Closed | |
Unassigned |
2.
|
Pass All Conformance Tests for FAPI R/W OP w/ Private Key |
|
Closed | |
Unassigned |