Description
We've been trying to use keycloak to protect API services provided by financial institutions. Under govermental reguration (e.g. Payment Service Directive(PSD2) in Europe), high level security is required for financial sector. One of the most promising security standard for financial API services is Financial API(FAPI) of OpenID Foundation. This is still implementer’s draft, but banking API systems compliant to FAPI are being implemented in some countries.
We've investigated keycloak and found that keycloak does not meet some of FAPI Security Profile requirements.We've been engaging in realizing them in keycloak, but had a lot of works. Is there someone who is interested in it?
Attachments
Issue Links
- is related to
-
KEYCLOAK-2604 Proof Key for Code Exchange by OAuth Public Clients
-
- Closed
-
-
KEYCLOAK-6768 Signed and Encrypted ID Token Support
-
- Closed
-
-
KEYCLOAK-6769 Multi-factor authentication and its corresponding "acr" value in ID Token
-
- Closed
-
-
KEYCLOAK-6770 JWS signatures using ES256 algorithms for signing
-
- Closed
-
-
KEYCLOAK-6771 Holder of Key mechanism: OAuth 2.0 Certificate Bound Access Tokens
-
- Closed
-
-
KEYCLOAK-11846 OpenID Connect Financial-grade API: Client Initiated Backchannel Authentication Profile
-
- Closed
-
-
KEYCLOAK-5661 OIDC Financial API Read Only Profile : scope MUST be returned in the response from Token Endpoint
-
- Closed
-
-
KEYCLOAK-6700 Financial API Read and Write API Security Profile : State hash value (s_hash) to protect state parameter
-
- Closed
-
-
KEYCLOAK-5811 OIDC Client Authentication by JWS Client Assertion in client_secret_jwt
-
- Closed
-
- relates to
-
KEYCLOAK-9560 [SPIKE] Evaluate FAPI
-
- Resolved
-
-
KEYCLOAK-10331 Pass All Conformance Tests for FAPI OpenID testsuite after Keycloak 15
-
- Closed
-