feat: support IDTokenSignedResponseAlgs for okta, oidc connections, OIDCMetadata for okta#707
Merged
developerkunal merged 4 commits intoauth0:v1from Mar 2, 2026
Conversation
…IDCMetadata for okta Added: * Adds IDTokenSignedResponseAlgs field to ConnectionOptionsOIDC and ConnectionOptionsOkta structs. * Adds OIDCMetadata field to ConnectionOptionsOkta struct * getter methods with nil-safe handling Purpose: IDTokenSignedResponseAlgs added to support restricting which algorithms are allowed to be used to validate upstream ID Tokens. OIDCMetadata was already on the OIDC struct, added to the Okta struct for parity. https://auth0team.atlassian.net/browse/IAMEF-1855
<
8000
div class="timeline-comment-header clearfix d-flex flex-items-start" data-morpheus-enabled="false">
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## v1 #707 +/- ##
=======================================
Coverage 96.74% 96.75%
=======================================
Files 62 62
Lines 10822 10834 +12
=======================================
+ Hits 10470 10482 +12
Misses 234 234
Partials 118 118 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
| // "authorization_endpoint": "https://example.com/authorize", | ||
| // "jwks_uri": "https://example.com/.well-known/jwks.json", | ||
| // } | ||
| OIDCMetadata map[string]interface{} `json:"oidc_metadata,omitempty"` |
There was a problem hiding this comment.
I notice that there OIDCMetadata is included in the OIDC Connection test case but not tested against in connection_test.go. Do we need to update the tests under connection_test.go to include these new properties?
Pineapplebun
approved these changes
Feb 26, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🔧 Changes
Added:
Purpose:
IDTokenSignedResponseAlgs added to support restricting which algorithms are allowed to be used to validate upstream ID Tokens.
OIDCMetadata was already on the OIDC struct, added to the Okta struct for parity.
📚 References
https://auth0team.atlassian.net/browse/IAMEF-1855
🔬 Testing
📝 Checklist