Details
-
Bug
-
Status: Triage
-
Major
-
Resolution: Unresolved
-
15.0.2
-
None
-
None
-
-
NEW
-
NEW
Description
A Requesting Party Token (RPT) can be introspected using the regular OIDC token introspection endpoint with HTTP Basic authentication, as demonstrated in the Authorization Services Guide.
However, Federated Authorization for User-Managed Access (UMA) 2.0 specifies that a Protection API Access Token (PAT, Bearer token with scope uma_protection) is used for this. Attempting to use a PAT for introspecting an RPT yields:
10:21:20,489 WARN [org.keycloak.events] (default task-5) type=INTROSPECT_TOKEN_ERROR, realmId=realm, clientId=null, userId=null, ipAddress=xxx.xxx.xxx.xxx, error=invalid_request, detail='Authentication failed.'
Attached are DEBUG logs from Keycloak 14.0, but I have confirmed that this is still an issue in Keycloak 15.0.2.
There seems to be a related feature request KEYCLOAK-2293 to allow token introspection with bearer tokens, but that has been closed and this issue is specifically for compatibility with UMA 2.0 Federation.