8000 feat: support IDTokenSignedResponseAlgs for okta, oidc connections, OIDCMetadata for okta by shane-tomlinson · Pull Request #707 · auth0/go-auth0 · GitHub
[go: up one dir, main page]

Skip to content

feat: support IDTokenSignedResponseAlgs for okta, oidc connections, OIDCMetadata for okta#707

Merged
developerkunal merged 4 commits intoauth0:v1from
shane-tomlinson:IAMEF-1855-oidc-okta-additional-alg-support
Mar 2, 2026
Merged

feat: support IDTokenSignedResponseAlgs for okta, oidc connections, OIDCMetadata for okta#707
developerkunal merged 4 commits intoauth0:v1from
shane-tomlinson:IAMEF-1855-oidc-okta-additional-alg-support

Conversation

@shane-tomlinson
Copy link
@shane-tomlinson shane-tomlinson commented Feb 25, 2026

🔧 Changes

Added:

  • Adds IDTokenSignedResponseAlgs field to ConnectionOptionsOIDC and ConnectionOptionsOkta structs.
  • Adds OIDCMetadata field to ConnectionOptionsOkta struct
  • getter methods with nil-safe handling

Purpose:
IDTokenSignedResponseAlgs added to support restricting which algorithms are allowed to be used to validate upstream ID Tokens.

OIDCMetadata was already on the OIDC struct, added to the Okta struct for parity.

📚 References

https://auth0team.atlassian.net/browse/IAMEF-1855

🔬 Testing

📝 Checklist

  • All new/changed/fixed functionality is covered by tests (or N/A)
  • I have added documentation for all new/changed functionality (or N/A)

…IDCMetadata for okta

Added:
* Adds IDTokenSignedResponseAlgs field to ConnectionOptionsOIDC and ConnectionOptionsOkta structs.
* Adds OIDCMetadata field to ConnectionOptionsOkta struct
* getter methods with nil-safe handling

Purpose:
IDTokenSignedResponseAlgs added to support restricting which algorithms are allowed to be
used to validate upstream ID Tokens.

OIDCMetadata was already on the OIDC struct, added to the Okta struct for parity.

https://auth0team.atlassian.net/browse/IAMEF-1855
@shane-tomlinson shane-tomlinson requested a review from a team as a code owner February 25, 2026 06:23
@codecov-commenter
< 8000 div class="timeline-comment-header clearfix d-flex flex-items-start" data-morpheus-enabled="false">
Copy link
codecov-commenter commented Feb 25, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 96.75%. Comparing base (30aab70) to head (2690994).
⚠️ Report is 1 commits behind head on v1.

Additional details and impacted files
@@           Coverage Diff           @@
##               v1     #707   +/-   ##
=======================================
  Coverage   96.74%   96.75%           
=======================================
  Files          62       62           
  Lines       10822    10834   +12     
=======================================
+ Hits        10470    10482   +12     
  Misses        234      234           
  Partials      118      118           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

// "authorization_endpoint": "https://example.com/authorize",
// "jwks_uri": "https://example.com/.well-known/jwks.json",
// }
OIDCMetadata map[string]interface{} `json:"oidc_metadata,omitempty"`

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I notice that there OIDCMetadata is included in the OIDC Connection test case but not tested against in connection_test.go. Do we need to update the tests under connection_test.go to include these new properties?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good shout, added in b4d9f15

Copy link
Contributor
@developerkunal developerkunal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@developerkunal developerkunal enabled auto-merge (squash) March 2, 2026 08:28
@developerkunal developerkunal merged commit 2dd3912 into auth0:v1 Mar 2, 2026
4 checks passed
@developerkunal developerkunal mentioned this pull request Mar 2, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants

0