How do I enable the Proof Key for Code Exchange (PKCE) extension to the authorization code flow in the OIDC plugin?
The OIDC plugin supports PKCE out of the box, so you don’t need to configure anything.
When config.auth_methods
is set to authorization_code
, the plugin sends the required code_challenge
parameter automatically with the authorization code flow request.
If the IdP connected to the plugin enforces PKCE, it will be used during the authorization code flow. If the IdP doesn’t support or enforce PCKE, it won’t be used.
How do I use custom scopes with the OIDC authorization code flow in Okta?
In Okta, make sure you add the custom claim to your authorization server scopes, claims, access policy, and access policy rules. Then, add your custom scope to config.scope_claim
and to config.scopes
in the OIDC plugin configuration.
How do I fix the "Cannot request 'openid' scopes
error when I try to set up OIDC auth with Okta?
You can’t use the openid
scope when using the client_credentials
grant type with Okta.
The way to fix this is to create a custom scope inside Okta and update the OpenID Connect plugin to reflect this change by adding it to scope_claim
and scopes
.