fictive.oidc.validator module¶
validate JSON Web Tokens using OpenID Connect Discovery
Classes
Use OIDC Discovery conventions to validate JWTs |
-
class
fictive.oidc.validator.OIDCBearerTokenValidator(issuer: str, realm: Optional[Union[str, collections.abc.Iterable[str]]] = None, claims_options: Optional[collections.abc.Mapping] = None, **extra_attributes: Any)[source]¶ Bases:
authlib.oauth2.rfc7523.validator.JWTBearerTokenValidatorUse OIDC Discovery conventions to validate JWTs
-
__init__(issuer: str, realm: Optional[Union[str, collections.abc.Iterable[str]]] = None, claims_options: Optional[collections.abc.Mapping] = None, **extra_attributes: Any) → None[source]¶ Initialize self. See help(type(self)) for accurate signature.
-
fetch_public_key(headers: collections.abc.Mapping, payload: collections.abc.Mapping) → collections.abc.Mapping[source]¶ see https://tools.ietf.org/html/draft-ietf-jose-json-web-key-41#section-5
-
property
jwk_set¶ see https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata
-
property
server_metadata¶ see https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationValidation # noqa: E501
-
property
well_known_url¶ see https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig
-