Replies: 1 comment 5 replies
-
You should use the OIDC userinfo endpoint to get claims about the user, and you can do that on demand (it is just another OAuth resource, so your access token gives you access to the endpoint). A bigger concern though is that your tokens should not be stored in a location that JavaScript can reach them, as this means that an injection attack can exfiltrate tokens. Historically, this kind of attack has been among the most common attacks against applications using OAuth and OIDC. To defend against this, you need a server process (usually called the backend for frontend or BFF) to perform protocol flows, session management and store tokens. |
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I have a Blazor WASM app integrated with my IdP via Open ID Connect. There are custom claims that we need that are stored in the ID Token and Auth Token. This all works fine in the most part. However, there are a couple of expected situations where a particular process will update source data for these and so the data in the tokens has become stale. So in the app I would like to force the refreshing of these tokens from the IdP so they have the latest information.
I have tried, unsuccessfully, to find how to so this. However, my Google-fu must be off as I have not found anything that even points me in the right direction.
If it is relevant I am using .Net 8 and my IdP is Auth0.
Anyone have any pointers?
Beta Was this translation helpful? Give feedback.
All reactions