UNPKG

angular-auth-oidc-client

Version:

An OpenID Connect Code Flow with PKCE,Implicit Flow client for Angular

674 lines 71.4 kB
/** * @fileoverview added by tsickle * @suppress {checkTypes,extraRequire,missingOverride,missingReturn,unusedPrivateMembers,uselessCode} checked by tsc */ import * as tslib_1 from "tslib"; import { Injectable } from '@angular/core'; import { hextob64u, KEYUTIL, KJUR } from 'jsrsasign'; import { EqualityHelperService } from './oidc-equality-helper.service'; import { TokenHelperService } from './oidc-token-helper.service'; import { LoggerService } from './oidc.logger.service'; // http://openid.net/specs/openid-connect-implicit-1_0.html // id_token // id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery) // MUST exactly match the value of the iss (issuer) Claim. // // id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified // by the iss (issuer) Claim as an audience.The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience, // or if it contains additional audiences not trusted by the Client. // // id_token C3: If the ID Token contains multiple audiences, the Client SHOULD verify that an azp Claim is present. // // id_token C4: If an azp (authorized party) Claim is present, the Client SHOULD verify that its client_id is the Claim Value. // // id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the // alg Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer. // // id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the OpenID Connect Core 1.0 // [OpenID.Core] specification. // // id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account // for clock skew). // // id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time, // limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific. // // id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one that was sent // in the Authentication Request.The Client SHOULD check the nonce value for replay attacks.The precise method for detecting replay attacks // is Client specific. // // id_token C10: If the acr Claim was requested, the Client SHOULD check that the asserted Claim Value is appropriate. // The meaning and processing of acr Claim Values is out of scope for this document. // // id_token C11: When a max_age request is made, the Client SHOULD check the auth_time Claim value and request re- authentication // if it determines too much time has elapsed since the last End- User authentication. // Access Token Validation // access_token C1: Hash the octets of the ASCII representation of the access_token with the hash algorithm specified in JWA[JWA] // for the alg Header Parameter of the ID Token's JOSE Header. For instance, if the alg is RS256, the hash algorithm used is SHA-256. // access_token C2: Take the left- most half of the hash and base64url- encode it. // access_token C3: The value of at_hash in the ID Token MUST match the value produced in the previous step if at_hash is present in the ID Token. var OidcSecurityValidation = /** @class */ (function () { function OidcSecurityValidation(arrayHelperService, tokenHelperService, loggerService) { this.arrayHelperService = arrayHelperService; this.tokenHelperService = tokenHelperService; this.loggerService = loggerService; } // id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew). // id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew). /** * @param {?} token * @param {?=} offsetSeconds * @return {?} */ OidcSecurityValidation.prototype.isTokenExpired = // id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew). /** * @param {?} token * @param {?=} offsetSeconds * @return {?} */ function (token, offsetSeconds) { /** @type {?} */ var decoded; decoded = this.tokenHelperService.getPayloadFromToken(token, false); return !this.validate_id_token_exp_not_expired(decoded, offsetSeconds); }; // id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew). // id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew). /** * @param {?} decoded_id_token * @param {?=} offsetSeconds * @return {?} */ OidcSecurityValidation.prototype.validate_id_token_exp_not_expired = // id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew). /** * @param {?} decoded_id_token * @param {?=} offsetSeconds * @return {?} */ function (decoded_id_token, offsetSeconds) { /** @type {?} */ var tokenExpirationDate = this.tokenHelperService.getTokenExpirationDate(decoded_id_token); offsetSeconds = offsetSeconds || 0; if (!tokenExpirationDate) { return false; } /** @type {?} */ var tokenExpirationValue = tokenExpirationDate.valueOf(); /** @type {?} */ var nowWithOffset = new Date().valueOf() + offsetSeconds * 1000; /** @type {?} */ var tokenNotExpired = tokenExpirationValue > nowWithOffset; this.loggerService.logDebug("Token not expired?: " + tokenExpirationValue + " > " + nowWithOffset + " (" + tokenNotExpired + ")"); // Token not expired? return tokenNotExpired; }; // iss // REQUIRED. Issuer Identifier for the Issuer of the response.The iss value is a case-sensitive URL using the https scheme that contains scheme, host, // and optionally, port number and path components and no query or fragment components. // // sub // REQUIRED. Subject Identifier.Locally unique and never reassigned identifier within the Issuer for the End- User, // which is intended to be consumed by the Client, e.g., 24400320 or AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4. // It MUST NOT exceed 255 ASCII characters in length.The sub value is a case-sensitive string. // // aud // REQUIRED. Audience(s) that this ID Token is intended for. It MUST contain the OAuth 2.0 client_id of the Relying Party as an audience value. // It MAY also contain identifiers for other audiences.In the general case, the aud value is an array of case-sensitive strings. // In the common special case when there is one audience, the aud value MAY be a single case-sensitive string. // // exp // REQUIRED. Expiration time on or after which the ID Token MUST NOT be accepted for processing. // The processing of this parameter requires that the current date/ time MUST be before the expiration date/ time listed in the value. // Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew. // Its value is a JSON [RFC7159] number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured in UTC until the date/ time. // See RFC 3339 [RFC3339] for details regarding date/ times in general and UTC in particular. // // iat // REQUIRED. Time at which the JWT was issued. Its value is a JSON number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured // in UTC until the date/ time. // iss // REQUIRED. Issuer Identifier for the Issuer of the response.The iss value is a case-sensitive URL using the https scheme that contains scheme, host, // and optionally, port number and path components and no query or fragment components. // // sub // REQUIRED. Subject Identifier.Locally unique and never reassigned identifier within the Issuer for the End- User, // which is intended to be consumed by the Client, e.g., 24400320 or AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4. // It MUST NOT exceed 255 ASCII characters in length.The sub value is a case-sensitive string. // // aud // REQUIRED. Audience(s) that this ID Token is intended for. It MUST contain the OAuth 2.0 client_id of the Relying Party as an audience value. // It MAY also contain identifiers for other audiences.In the general case, the aud value is an array of case-sensitive strings. // In the common special case when there is one audience, the aud value MAY be a single case-sensitive string. // // exp // REQUIRED. Expiration time on or after which the ID Token MUST NOT be accepted for processing. // The processing of this parameter requires that the current date/ time MUST be before the expiration date/ time listed in the value. // Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew. // Its value is a JSON [RFC7159] number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured in UTC until the date/ time. // See RFC 3339 [RFC3339] for details regarding date/ times in general and UTC in particular. // // iat // REQUIRED. Time at which the JWT was issued. Its value is a JSON number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured // in UTC until the date/ time. /** * @param {?} dataIdToken * @return {?} */ OidcSecurityValidation.prototype.validate_required_id_token = // iss // REQUIRED. Issuer Identifier for the Issuer of the response.The iss value is a case-sensitive URL using the https scheme that contains scheme, host, // and optionally, port number and path components and no query or fragment components. // // sub // REQUIRED. Subject Identifier.Locally unique and never reassigned identifier within the Issuer for the End- User, // which is intended to be consumed by the Client, e.g., 24400320 or AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4. // It MUST NOT exceed 255 ASCII characters in length.The sub value is a case-sensitive string. // // aud // REQUIRED. Audience(s) that this ID Token is intended for. It MUST contain the OAuth 2.0 client_id of the Relying Party as an audience value. // It MAY also contain identifiers for other audiences.In the general case, the aud value is an array of case-sensitive strings. // In the common special case when there is one audience, the aud value MAY be a single case-sensitive string. // // exp // REQUIRED. Expiration time on or after which the ID Token MUST NOT be accepted for processing. // The processing of this parameter requires that the current date/ time MUST be before the expiration date/ time listed in the value. // Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew. // Its value is a JSON [RFC7159] number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured in UTC until the date/ time. // See RFC 3339 [RFC3339] for details regarding date/ times in general and UTC in particular. // // iat // REQUIRED. Time at which the JWT was issued. Its value is a JSON number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured // in UTC until the date/ time. /** * @param {?} dataIdToken * @return {?} */ function (dataIdToken) { /** @type {?} */ var validated = true; if (!dataIdToken.hasOwnProperty('iss')) { validated = false; this.loggerService.logWarning('iss is missing, this is required in the id_token'); } if (!dataIdToken.hasOwnProperty('sub')) { validated = false; this.loggerService.logWarning('sub is missing, this is required in the id_token'); } if (!dataIdToken.hasOwnProperty('aud')) { validated = false; this.loggerService.logWarning('aud is missing, this is required in the id_token'); } if (!dataIdToken.hasOwnProperty('exp')) { validated = false; this.loggerService.logWarning('exp is missing, this is required in the id_token'); } if (!dataIdToken.hasOwnProperty('iat')) { validated = false; this.loggerService.logWarning('iat is missing, this is required in the id_token'); } return validated; }; // id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time, // limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific. // id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time, // limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific. /** * @param {?} dataIdToken * @param {?} max_offset_allowed_in_seconds * @param {?} disable_iat_offset_validation * @return {?} */ OidcSecurityValidation.prototype.validate_id_token_iat_max_offset = // id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time, // limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific. /** * @param {?} dataIdToken * @param {?} max_offset_allowed_in_seconds * @param {?} disable_iat_offset_validation * @return {?} */ function (dataIdToken, max_offset_allowed_in_seconds, disable_iat_offset_validation) { if (disable_iat_offset_validation) { return true; } if (!dataIdToken.hasOwnProperty('iat')) { return false; } /** @type {?} */ var dateTime_iat_id_token = new Date(0); dateTime_iat_id_token.setUTCSeconds(dataIdToken.iat); max_offset_allowed_in_seconds = max_offset_allowed_in_seconds || 0; if (dateTime_iat_id_token == null) { return false; } this.loggerService.logDebug('validate_id_token_iat_max_offset: ' + (new Date().valueOf() - dateTime_iat_id_token.valueOf()) + ' < ' + max_offset_allowed_in_seconds * 1000); return new Date().valueOf() - dateTime_iat_id_token.valueOf() < max_offset_allowed_in_seconds * 1000; }; // id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one // that was sent in the Authentication Request.The Client SHOULD check the nonce value for replay attacks. // The precise method for detecting replay attacks is Client specific. // id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one // that was sent in the Authentication Request.The Client SHOULD check the nonce value for replay attacks. // The precise method for detecting replay attacks is Client specific. /** * @param {?} dataIdToken * @param {?} local_nonce * @return {?} */ OidcSecurityValidation.prototype.validate_id_token_nonce = // id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one // that was sent in the Authentication Request.The Client SHOULD check the nonce value for replay attacks. // The precise method for detecting replay attacks is Client specific. /** * @param {?} dataIdToken * @param {?} local_nonce * @return {?} */ function (dataIdToken, local_nonce) { if (dataIdToken.nonce !== local_nonce) { this.loggerService.logDebug('Validate_id_token_nonce failed, dataIdToken.nonce: ' + dataIdToken.nonce + ' local_nonce:' + local_nonce); return false; } return true; }; // id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery) // MUST exactly match the value of the iss (issuer) Claim. // id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery) // MUST exactly match the value of the iss (issuer) Claim. /** * @param {?} dataIdToken * @param {?} authWellKnownEndpoints_issuer * @return {?} */ OidcSecurityValidation.prototype.validate_id_token_iss = // id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery) // MUST exactly match the value of the iss (issuer) Claim. /** * @param {?} dataIdToken * @param {?} authWellKnownEndpoints_issuer * @return {?} */ function (dataIdToken, authWellKnownEndpoints_issuer) { if (((/** @type {?} */ (dataIdToken.iss))) !== ((/** @type {?} */ (authWellKnownEndpoints_issuer)))) { this.loggerService.logDebug('Validate_id_token_iss failed, dataIdToken.iss: ' + dataIdToken.iss + ' authWellKnownEndpoints issuer:' + authWellKnownEndpoints_issuer); return false; } return true; }; // id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified // by the iss (issuer) Claim as an audience. // The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience, or if it contains additional audiences // not trusted by the Client. // id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified // by the iss (issuer) Claim as an audience. // The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience, or if it contains additional audiences // not trusted by the Client. /** * @param {?} dataIdToken * @param {?} aud * @return {?} */ OidcSecurityValidation.prototype.validate_id_token_aud = // id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified // by the iss (issuer) Claim as an audience. // The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience, or if it contains additional audiences // not trusted by the Client. /** * @param {?} dataIdToken * @param {?} aud * @return {?} */ function (dataIdToken, aud) { if (dataIdToken.aud instanceof Array) { /** @type {?} */ var result = this.arrayHelperService.areEqual(dataIdToken.aud, aud); if (!result) { this.loggerService.logDebug('Validate_id_token_aud array failed, dataIdToken.aud: ' + dataIdToken.aud + ' client_id:' + aud); return false; } return true; } else if (dataIdToken.aud !== aud) { this.loggerService.logDebug('Validate_id_token_aud failed, dataIdToken.aud: ' + dataIdToken.aud + ' client_id:' + aud); return false; } return true; }; /** * @param {?} state * @param {?} local_state * @return {?} */ OidcSecurityValidation.prototype.validateStateFromHashCallback = /** * @param {?} state * @param {?} local_state * @return {?} */ function (state, local_state) { if (((/** @type {?} */ (state))) !== ((/** @type {?} */ (local_state)))) { this.loggerService.logDebug('ValidateStateFromHashCallback failed, state: ' + state + ' local_state:' + local_state); return false; } return true; }; /** * @param {?} id_token_sub * @param {?} userdata_sub * @return {?} */ OidcSecurityValidation.prototype.validate_userdata_sub_id_token = /** * @param {?} id_token_sub * @param {?} userdata_sub * @return {?} */ function (id_token_sub, userdata_sub) { if (((/** @type {?} */ (id_token_sub))) !== ((/** @type {?} */ (userdata_sub)))) { this.loggerService.logDebug('validate_userdata_sub_id_token failed, id_token_sub: ' + id_token_sub + ' userdata_sub:' + userdata_sub); return false; } return true; }; // id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the alg // Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer. // id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the // OpenID Connect Core 1.0 [OpenID.Core] specification. // id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the alg // Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer. // id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the // OpenID Connect Core 1.0 [OpenID.Core] specification. /** * @param {?} id_token * @param {?} jwtkeys * @return {?} */ OidcSecurityValidation.prototype.validate_signature_id_token = // id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the alg // Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer. // id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the // OpenID Connect Core 1.0 [OpenID.Core] specification. /** * @param {?} id_token * @param {?} jwtkeys * @return {?} */ function (id_token, jwtkeys) { var e_1, _a, e_2, _b, e_3, _c; if (!jwtkeys || !jwtkeys.keys) { return false; } /** @type {?} */ var header_data = this.tokenHelperService.getHeaderFromToken(id_token, false); if (Object.keys(header_data).length === 0 && header_data.constructor === Object) { this.loggerService.logWarning('id token has no header data'); return false; } /** @type {?} */ var kid = header_data.kid; /** @type {?} */ var alg = header_data.alg; if ('RS256' !== ((/** @type {?} */ (alg)))) { this.loggerService.logWarning('Only RS256 supported'); return false; } /** @type {?} */ var isValid = false; if (!header_data.hasOwnProperty('kid')) { // exactly 1 key in the jwtkeys and no kid in the Jose header // kty "RSA" use "sig" /** @type {?} */ var amountOfMatchingKeys = 0; try { for (var _d = tslib_1.__values(jwtkeys.keys), _e = _d.next(); !_e.done; _e = _d.next()) { var key = _e.value; if (((/** @type {?} */ (key.kty))) === 'RSA' && ((/** @type {?} */ (key.use))) === 'sig') { amountOfMatchingKeys = amountOfMatchingKeys + 1; } } } catch (e_1_1) { e_1 = { error: e_1_1 }; } finally { try { if (_e && !_e.done && (_a = _d.return)) _a.call(_d); } finally { if (e_1) throw e_1.error; } } if (amountOfMatchingKeys === 0) { this.loggerService.logWarning('no keys found, incorrect Signature, validation failed for id_token'); return false; } else if (amountOfMatchingKeys > 1) { this.loggerService.logWarning('no ID Token kid claim in JOSE header and multiple supplied in jwks_uri'); return false; } else { try { for (var _f = tslib_1.__values(jwtkeys.keys), _g = _f.next(); !_g.done; _g = _f.next()) { var key = _g.value; if (((/** @type {?} */ (key.kty))) === 'RSA' && ((/** @type {?} */ (key.use))) === 'sig') { /** @type {?} */ var publickey = KEYUTIL.getKey(key); isValid = KJUR.jws.JWS.verify(id_token, publickey, ['RS256']); if (!isValid) { this.loggerService.logWarning('incorrect Signature, validation failed for id_token'); } return isValid; } } } catch (e_2_1) { e_2 = { error: e_2_1 }; } finally { try { if (_g && !_g.done && (_b = _f.return)) _b.call(_f); } finally { if (e_2) throw e_2.error; } } } } else { try { // kid in the Jose header of id_token for (var _h = tslib_1.__values(jwtkeys.keys), _j = _h.next(); !_j.done; _j = _h.next()) { var key = _j.value; if (((/** @type {?} */ (key.kid))) === ((/** @type {?} */ (kid)))) { /** @type {?} */ var publickey = KEYUTIL.getKey(key); isValid = KJUR.jws.JWS.verify(id_token, publickey, ['RS256']); if (!isValid) { this.loggerService.logWarning('incorrect Signature, validation failed for id_token'); } return isValid; } } } catch (e_3_1) { e_3 = { error: e_3_1 }; } finally { try { if (_j && !_j.done && (_c = _h.return)) _c.call(_h); } finally { if (e_3) throw e_3.error; } } } return isValid; }; /** * @param {?} response_type * @return {?} */ OidcSecurityValidation.prototype.config_validate_response_type = /** * @param {?} response_type * @return {?} */ function (response_type) { if (response_type === 'id_token token' || response_type === 'id_token') { return true; } if (response_type === 'code') { return true; } this.loggerService.logWarning('module configure incorrect, invalid response_type:' + response_type); return false; }; // Accepts ID Token without 'kid' claim in JOSE header if only one JWK supplied in 'jwks_url' //// private validate_no_kid_in_header_only_one_allowed_in_jwtkeys(header_data: any, jwtkeys: any): boolean { //// this.oidcSecurityCommon.logDebug('amount of jwtkeys.keys: ' + jwtkeys.keys.length); //// if (!header_data.hasOwnProperty('kid')) { //// // no kid defined in Jose header //// if (jwtkeys.keys.length != 1) { //// this.oidcSecurityCommon.logDebug('jwtkeys.keys.length != 1 and no kid in header'); //// return false; //// } //// } //// return true; //// } // Access Token Validation // access_token C1: Hash the octets of the ASCII representation of the access_token with the hash algorithm specified in JWA[JWA] // for the alg Header Parameter of the ID Token's JOSE Header. For instance, if the alg is RS256, the hash algorithm used is SHA-256. // access_token C2: Take the left- most half of the hash and base64url- encode it. // access_token C3: The value of at_hash in the ID Token MUST match the value produced in the previous step if at_hash // is present in the ID Token. // Accepts ID Token without 'kid' claim in JOSE header if only one JWK supplied in 'jwks_url' //// private validate_no_kid_in_header_only_one_allowed_in_jwtkeys(header_data: any, jwtkeys: any): boolean { //// this.oidcSecurityCommon.logDebug('amount of jwtkeys.keys: ' + jwtkeys.keys.length); //// if (!header_data.hasOwnProperty('kid')) { //// // no kid defined in Jose header //// if (jwtkeys.keys.length != 1) { //// this.oidcSecurityCommon.logDebug('jwtkeys.keys.length != 1 and no kid in header'); //// return false; //// } //// } //// return true; //// } // Access Token Validation // access_token C1: Hash the octets of the ASCII representation of the access_token with the hash algorithm specified in JWA[JWA] // for the alg Header Parameter of the ID Token's JOSE Header. For instance, if the alg is RS256, the hash algorithm used is SHA-256. // access_token C2: Take the left- most half of the hash and base64url- encode it. // access_token C3: The value of at_hash in the ID Token MUST match the value produced in the previous step if at_hash // is present in the ID Token. /** * @param {?} access_token * @param {?} at_hash * @param {?} isCodeFlow * @return {?} */ OidcSecurityValidation.prototype.validate_id_token_at_hash = // Accepts ID Token without 'kid' claim in JOSE header if only one JWK supplied in 'jwks_url' //// private validate_no_kid_in_header_only_one_allowed_in_jwtkeys(header_data: any, jwtkeys: any): boolean { //// this.oidcSecurityCommon.logDebug('amount of jwtkeys.keys: ' + jwtkeys.keys.length); //// if (!header_data.hasOwnProperty('kid')) { //// // no kid defined in Jose header //// if (jwtkeys.keys.length != 1) { //// this.oidcSecurityCommon.logDebug('jwtkeys.keys.length != 1 and no kid in header'); //// return false; //// } //// } //// return true; //// } // Access Token Validation // access_token C1: Hash the octets of the ASCII representation of the access_token with the hash algorithm specified in JWA[JWA] // for the alg Header Parameter of the ID Token's JOSE Header. For instance, if the alg is RS256, the hash algorithm used is SHA-256. // access_token C2: Take the left- most half of the hash and base64url- encode it. // access_token C3: The value of at_hash in the ID Token MUST match the value produced in the previous step if at_hash // is present in the ID Token. /** * @param {?} access_token * @param {?} at_hash * @param {?} isCodeFlow * @return {?} */ function (access_token, at_hash, isCodeFlow) { this.loggerService.logDebug('at_hash from the server:' + at_hash); // The at_hash is optional for the code flow if (isCodeFlow) { if (!((/** @type {?} */ (at_hash)))) { this.loggerService.logDebug('Code Flow active, and no at_hash in the id_token, skipping check!'); return true; } } /** @type {?} */ var testdata = this.generate_at_hash('' + access_token); this.loggerService.logDebug('at_hash client validation not decoded:' + testdata); if (testdata === ((/** @type {?} */ (at_hash)))) { return true; // isValid; } else { /** @type {?} */ var testValue = this.generate_at_hash('' + decodeURIComponent(access_token)); this.loggerService.logDebug('-gen access--' + testValue); if (testValue === ((/** @type {?} */ (at_hash)))) { return true; // isValid } } return false; }; /** * @private * @param {?} access_token * @return {?} */ OidcSecurityValidation.prototype.generate_at_hash = /** * @private * @param {?} access_token * @return {?} */ function (access_token) { /** @type {?} */ var hash = KJUR.crypto.Util.hashString(access_token, 'sha256'); /** @type {?} */ var first128bits = hash.substr(0, hash.length / 2); /** @type {?} */ var testdata = hextob64u(first128bits); return testdata; }; /** * @param {?} code_challenge * @return {?} */ OidcSecurityValidation.prototype.generate_code_verifier = /** * @param {?} code_challenge * @return {?} */ function (code_challenge) { /** @type {?} */ var hash = KJUR.crypto.Util.hashString(code_challenge, 'sha256'); /** @type {?} */ var testdata = hextob64u(hash); return testdata; }; OidcSecurityValidation.decorators = [ { type: Injectable } ]; /** @nocollapse */ OidcSecurityValidation.ctorParameters = function () { return [ { type: EqualityHelperService }, { type: TokenHelperService }, { type: LoggerService } ]; }; return OidcSecurityValidation; }()); export { OidcSecurityValidation }; if (false) { /** * @type {?} * @private */ OidcSecurityValidation.prototype.arrayHelperService; /** * @type {?} * @private */ OidcSecurityValidation.prototype.tokenHelperService; /** * @type {?} * @private */ OidcSecurityValidation.prototype.loggerService; } //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"oidc.security.validation.js","sourceRoot":"ng://angular-auth-oidc-client/","sources":["lib/services/oidc.security.validation.ts"],"names":[],"mappings":";;;;;AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAC3C,OAAO,EAAE,SAAS,EAAE,OAAO,EAAE,IAAI,EAAE,MAAM,WAAW,CAAC;AACrD,OAAO,EAAE,qBAAqB,EAAE,MAAM,gCAAgC,CAAC;AACvE,OAAO,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AA4CtD;IAEI,gCACY,kBAAyC,EACzC,kBAAsC,EACtC,aAA4B;QAF5B,uBAAkB,GAAlB,kBAAkB,CAAuB;QACzC,uBAAkB,GAAlB,kBAAkB,CAAoB;QACtC,kBAAa,GAAb,aAAa,CAAe;IACrC,CAAC;IAEJ,0JAA0J;;;;;;;IAC1J,+CAAc;;;;;;;IAAd,UAAe,KAAa,EAAE,aAAsB;;YAC5C,OAAY;QAChB,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;QAEpE,OAAO,CAAC,IAAI,CAAC,iCAAiC,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC;IAC3E,CAAC;IAED,0JAA0J;;;;;;;IAC1J,kEAAiC;;;;;;;IAAjC,UAAkC,gBAAwB,EAAE,aAAsB;;YACxE,mBAAmB,GAAG,IAAI,CAAC,kBAAkB,CAAC,sBAAsB,CAAC,gBAAgB,CAAC;QAC5F,aAAa,GAAG,aAAa,IAAI,CAAC,CAAC;QAEnC,IAAI,CAAC,mBAAmB,EAAE;YACtB,OAAO,KAAK,CAAC;SAChB;;YAEK,oBAAoB,GAAG,mBAAmB,CAAC,OAAO,EAAE;;YACpD,aAAa,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,aAAa,GAAG,IAAI;;YAC3D,eAAe,GAAG,oBAAoB,GAAG,aAAa;QAE5D,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,yBAAuB,oBAAoB,WAAM,aAAa,WAAM,eAAe,MAAG,CAAC,CAAC;QAEpH,qBAAqB;QACrB,OAAO,eAAe,CAAC;IAC3B,CAAC;IAED,MAAM;IACN,sJAAsJ;IACtJ,uFAAuF;IACvF,EAAE;IACF,MAAM;IACN,mHAAmH;IACnH,6GAA6G;IAC7G,8FAA8F;IAC9F,EAAE;IACF,MAAM;IACN,+IAA+I;IAC/I,gIAAgI;IAChI,8GAA8G;IAC9G,EAAE;IACF,MAAM;IACN,gGAAgG;IAChG,sIAAsI;IACtI,iHAAiH;IACjH,iJAAiJ;IACjJ,6FAA6F;IAC7F,EAAE;IACF,MAAM;IACN,sJAAsJ;IACtJ,+BAA+B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;IAC/B,2DAA0B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;IAA1B,UAA2B,WAAgB;;YACnC,SAAS,GAAG,IAAI;QACpB,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,OAAO,SAAS,CAAC;IACrB,CAAC;IAED,+GAA+G;IAC/G,wHAAwH;;;;;;;;;IACxH,iEAAgC;;;;;;;;;IAAhC,UAAiC,WAAgB,EAC7C,6BAAqC,EACrC,6BAAsC;QAEtC,IAAI,6BAA6B,EAAE;YAC/B,OAAO,IAAI,CAAC;SACf;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,OAAO,KAAK,CAAC;SAChB;;YAEK,qBAAqB,GAAG,IAAI,IAAI,CAAC,CAAC,CAAC;QACzC,qBAAqB,CAAC,aAAa,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;QAErD,6BAA6B,GAAG,6BAA6B,IAAI,CAAC,CAAC;QAEnE,IAAI,qBAAqB,IAAI,IAAI,EAAE;YAC/B,OAAO,KAAK,CAAC;SAChB;QAED,IAAI,CAAC,aAAa,CAAC,QAAQ,CACvB,oCAAoC;YAChC,CAAC,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,qBAAqB,CAAC,OAAO,EAAE,CAAC;YACxD,KAAK;YACL,6BAA6B,GAAG,IAAI,CAC3C,CAAC;QACF,OAAO,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,qBAAqB,CAAC,OAAO,EAAE,GAAG,6BAA6B,GAAG,IAAI,CAAC;IACzG,CAAC;IAED,2GAA2G;IAC3G,0GAA0G;IAC1G,sEAAsE;;;;;;;;;IACtE,wDAAuB;;;;;;;;;IAAvB,UAAwB,WAAgB,EAAE,WAAgB;QACtD,IAAI,WAAW,CAAC,KAAK,KAAK,WAAW,EAAE;YACnC,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,qDAAqD,GAAG,WAAW,CAAC,KAAK,GAAG,eAAe,GAAG,WAAW,CAAC,CAAC;YACvI,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,4GAA4G;IAC5G,0DAA0D;;;;;;;;IAC1D,sDAAqB;;;;;;;;IAArB,UAAsB,WAAgB,EAAE,6BAAkC;QACtE,IAAI,CAAC,mBAAA,WAAW,CAAC,GAAG,EAAU,CAAC,KAAK,CAAC,mBAAA,6BAA6B,EAAU,CAAC,EAAE;YAC3E,IAAI,CAAC,aAAa,CAAC,QAAQ,CACvB,iDAAiD;gBAC7C,WAAW,CAAC,GAAG;gBACf,iCAAiC;gBACjC,6BAA6B,CACpC,CAAC;YACF,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,uIAAuI;IACvI,4CAA4C;IAC5C,qIAAqI;IACrI,6BAA6B;;;;;;;;;;IAC7B,sDAAqB;;;;;;;;;;IAArB,UAAsB,WAAgB,EAAE,GAAQ;QAC5C,IAAI,WAAW,CAAC,GAAG,YAAY,KAAK,EAAE;;gBAC5B,MAAM,GAAG,IAAI,CAAC,kBAAkB,CAAC,QAAQ,CAAC,WAAW,CAAC,GAAG,EAAE,GAAG,CAAC;YAErE,IAAI,CAAC,MAAM,EAAE;gBACT,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,wDAAwD,GAAG,WAAW,CAAC,GAAG,GAAG,aAAa,GAAG,GAAG,CAAC,CAAC;gBAC9H,OAAO,KAAK,CAAC;aAChB;YAED,OAAO,IAAI,CAAC;SACf;aAAM,IAAI,WAAW,CAAC,GAAG,KAAK,GAAG,EAAE;YAChC,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,iDAAiD,GAAG,WAAW,CAAC,GAAG,GAAG,aAAa,GAAG,GAAG,CAAC,CAAC;YAEvH,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;;;;;;IAED,8DAA6B;;;;;IAA7B,UAA8B,KAAU,EAAE,WAAgB;QACtD,IAAI,CAAC,mBAAA,KAAK,EAAU,CAAC,KAAK,CAAC,mBAAA,WAAW,EAAU,CAAC,EAAE;YAC/C,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,+CAA+C,GAAG,KAAK,GAAG,eAAe,GAAG,WAAW,CAAC,CAAC;YACrH,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;;;;;;IAED,+DAA8B;;;;;IAA9B,UAA+B,YAAiB,EAAE,YAAiB;QAC/D,IAAI,CAAC,mBAAA,YAAY,EAAU,CAAC,KAAK,CAAC,mBAAA,YAAY,EAAU,CAAC,EAAE;YACvD,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,uDAAuD,GAAG,YAAY,GAAG,gBAAgB,GAAG,YAAY,CAAC,CAAC;YACtI,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,sIAAsI;IACtI,2FAA2F;IAC3F,sHAAsH;IACtH,uDAAuD;;;;;;;;;;IACvD,4DAA2B;;;;;;;;;;IAA3B,UAA4B,QAAa,EAAE,OAAY;;QACnD,IAAI,CAAC,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE;YAC3B,OAAO,KAAK,CAAC;SAChB;;YAEK,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,kBAAkB,CAAC,QAAQ,EAAE,KAAK,CAAC;QAE/E,IAAI,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,MAAM,KAAK,CAAC,IAAI,WAAW,CAAC,WAAW,KAAK,MAAM,EAAE;YAC7E,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,6BAA6B,CAAC,CAAC;YAC7D,OAAO,KAAK,CAAC;SAChB;;YAEK,GAAG,GAAG,WAAW,CAAC,GAAG;;YACrB,GAAG,GAAG,WAAW,CAAC,GAAG;QAE3B,IAAI,OAAO,KAAK,CAAC,mBAAA,GAAG,EAAU,CAAC,EAAE;YAC7B,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,sBAAsB,CAAC,CAAC;YACtD,OAAO,KAAK,CAAC;SAChB;;YAEG,OAAO,GAAG,KAAK;QAEnB,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;;;;gBAGhC,oBAAoB,GAAG,CAAC;;gBAC5B,KAAkB,IAAA,KAAA,iBAAA,OAAO,CAAC,IAAI,CAAA,gBAAA,4BAAE;oBAA3B,IAAM,GAAG,WAAA;oBACV,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,KAAK,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,KAAK,EAAE;wBAChE,oBAAoB,GAAG,oBAAoB,GAAG,CAAC,CAAC;qBACnD;iBACJ;;;;;;;;;YAED,IAAI,oBAAoB,KAAK,CAAC,EAAE;gBAC5B,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,oEAAoE,CAAC,CAAC;gBACpG,OAAO,KAAK,CAAC;aAChB;iBAAM,IAAI,oBAAoB,GAAG,CAAC,EAAE;gBACjC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,wEAAwE,CAAC,CAAC;gBACxG,OAAO,KAAK,CAAC;aAChB;iBAAM;;oBACH,KAAkB,IAAA,KAAA,iBAAA,OAAO,CAAC,IAAI,CAAA,gBAAA,4BAAE;wBAA3B,IAAM,GAAG,WAAA;wBACV,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,KAAK,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,KAAK,EAAE;;gCAC1D,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC;4BACrC,OAAO,GAAG,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,EAAE,CAAC,OAAO,CAAC,CAAC,CAAC;4BAC9D,IAAI,CAAC,OAAO,EAAE;gCACV,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,qDAAqD,CAAC,CAAC;6BACxF;4BACD,OAAO,OAAO,CAAC;yBAClB;qBACJ;;;;;;;;;aACJ;SACJ;aAAM;;gBACH,qCAAqC;gBACrC,KAAkB,IAAA,KAAA,iBAAA,OAAO,CAAC,IAAI,CAAA,gBAAA,4BAAE;oBAA3B,IAAM,GAAG,WAAA;oBACV,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,CAAC,mBAAA,GAAG,EAAU,CAAC,EAAE;;4BACnC,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC;wBACrC,OAAO,GAAG,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,EAAE,CAAC,OAAO,CAAC,CAAC,CAAC;wBAC9D,IAAI,CAAC,OAAO,EAAE;4BACV,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,qDAAqD,CAAC,CAAC;yBACxF;wBACD,OAAO,OAAO,CAAC;qBAClB;iBACJ;;;;;;;;;SACJ;QAED,OAAO,OAAO,CAAC;IACnB,CAAC;;;;;IAED,8DAA6B;;;;IAA7B,UAA8B,aAAqB;QAC/C,IAAI,aAAa,KAAK,gBAAgB,IAAI,aAAa,KAAK,UAAU,EAAE;YACpE,OAAO,IAAI,CAAC;SACf;QAED,IAAI,aAAa,KAAK,MAAM,EAAE;YAC1B,OAAO,IAAI,CAAC;SACf;QAED,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,oDAAoD,GAAG,aAAa,CAAC,CAAC;QACpG,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,6FAA6F;IAC7F,6GAA6G;IAC7G,2FAA2F;IAC3F,iDAAiD;IACjD,4CAA4C;IAC5C,2CAA2C;IAC3C,kGAAkG;IAClG,6BAA6B;IAC7B,aAAa;IACb,SAAS;IAET,oBAAoB;IACpB,MAAM;IAEN,0BAA0B;IAC1B,iIAAiI;IACjI,qIAAqI;IACrI,kFAAkF;IAClF,sHAAsH;IACtH,8BAA8B;;;;;;;;;;;;;;;;;;;;;;;;;IAC9B,0DAAyB;;;;;;;;;;;;;;;;;;;;;;;;;IAAzB,UAA0B,YAAiB,EAAE,OAAY,EAAE,UAAmB;QAC1E,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,0BAA0B,GAAG,OAAO,CAAC,CAAC;QAElE,4CAA4C;QAC5C,IAAI,UAAU,EAAE;YACZ,IAAI,CAAC,CAAC,mBAAA,OAAO,EAAU,CAAC,EAAE;gBACtB,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,mEAAmE,CAAC,CAAC;gBACjG,OAAO,IAAI,CAAC;aACf;SACJ;;YAEK,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,EAAE,GAAG,YAAY,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,wCAAwC,GAAG,QAAQ,CAAC,CAAC;QACjF,IAAI,QAAQ,KAAK,CAAC,mBAAA,OAAO,EAAU,CAAC,EAAE;YAClC,OAAO,IAAI,CAAC,CAAC,WAAW;SAC3B;aAAM;;gBACG,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC,EAAE,GAAG,kBAAkB,CAAC,YAAY,CAAC,CAAC;YAC9E,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,eAAe,GAAG,SAAS,CAAC,CAAC;YACzD,IAAI,SAAS,KAAK,CAAC,mBAAA,OAAO,EAAU,CAAC,EAAE;gBACnC,OAAO,IAAI,CAAC,CAAC,UAAU;aAC1B;SACJ;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;;;;;;IAEO,iDAAgB;;;;;IAAxB,UAAyB,YAAiB;;YAChC,IAAI,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,QAAQ,CAAC;;YAC1D,YAAY,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC,EAAE,IAAI,CAAC,MAAM,GAAG,CAAC,CAAC;;YAC9C,QAAQ,GAAG,SAAS,CAAC,YAAY,CAAC;QAExC,OAAO,QAAQ,CAAC;IACpB,CAAC;;;;;IAED,uDAAsB;;;;IAAtB,UAAuB,cAAmB;;YAChC,IAAI,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,EAAE,QAAQ,CAAC;;YAC5D,QAAQ,GAAG,SAAS,CAAC,IAAI,CAAC;QAEhC,OAAO,QAAQ,CAAC;IACpB,CAAC;;gBA7UJ,UAAU;;;;gBA9CF,qBAAqB;gBACrB,kBAAkB;gBAClB,aAAa;;IA0XtB,6BAAC;CAAA,AA9UD,IA8UC;SA7UY,sBAAsB;;;;;;IAE3B,oDAAiD;;;;;IACjD,oDAA8C;;;;;IAC9C,+CAAoC","sourcesContent":["import { Injectable } from '@angular/core';\nimport { hextob64u, KEYUTIL, KJUR } from 'jsrsasign';\nimport { EqualityHelperService } from './oidc-equality-helper.service';\nimport { TokenHelperService } from './oidc-token-helper.service';\nimport { LoggerService } from './oidc.logger.service';\n\n// http://openid.net/specs/openid-connect-implicit-1_0.html\n\n// id_token\n// id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery)\n// MUST exactly match the value of the iss (issuer) Claim.\n//\n// id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified\n// by the iss (issuer) Claim as an audience.The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience,\n// or if it contains additional audiences not trusted by the Client.\n//\n// id_token C3: If the ID Token contains multiple audiences, the Client SHOULD verify that an azp Claim is present.\n//\n// id_token C4: If an azp (authorized party) Claim is present, the Client SHOULD verify that its client_id is the Claim Value.\n//\n// id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the\n// alg Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer.\n//\n// id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the OpenID Connect Core 1.0\n// [OpenID.Core] specification.\n//\n// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account\n// for clock skew).\n//\n// id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,\n// limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.\n//\n// id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one that was sent\n// in the Authentication Request.The Client SHOULD check the nonce value for replay attacks.The precise method for detecting replay attacks\n// is Client specific.\n//\n// id_token C10: If the acr Claim was requested, the Client SHOULD check that the asserted Claim Value is appropriate.\n// The meaning and processing of acr Claim Values is out of scope for this document.\n//\n// id_token C11: When a max_age request is made, the Client SHOULD check the auth_time Claim va