OpenID Connect Core 1.0
Spec: openid.net/specs/openid-connect-core-1_0.htmlStatus: Partial
OpenID Connect Core layers identity semantics on top of OAuth 2.0: ID tokens, the UserInfo endpoint, and standard claims.
Implemented
- Authorization Code Flow —
response_type=code, with an ID token returned from the token endpoint. - Hybrid Flow —
code id_token,code token,code token id_token. - Implicit Flow response types —
id_tokenandtoken id_tokenare accepted, though direct implicit is discouraged. - ID Token — signed RS256 JWT containing
iss,sub,aud,exp,iat,auth_time,nonce,acrwhen requested. - Nonce — round-tripped and validated to prevent replay.
max_age/auth_time— enforced per OIDC Core §3.1.2.1; re-authentication is required when the existing session is older thanmax_age.acr_values— forwarded and echoed into the ID token.- UserInfo endpoint —
GETandPOST /userinfo, scope-filtered (openid,profile,email,address,phone). - Standard claims —
sub,email,email_verified,name,given_name,family_name,middle_name,nickname,preferred_username,profile,picture,website,gender,birthdate,zoneinfo,locale,phone_number,phone_number_verified,address(per §5.1.1). prompt—none,login,consent, andselect_accountbehaviors.
Partial / not yet implemented
- Request Objects —
requestandrequest_uriparameters are advertised as unsupported (request_parameter_supported: false,request_uri_parameter_supported: false). - Pairwise subject identifiers — only
publicsubject type is supported. - Client authentication with
private_key_jwt— not yet implemented. - Claims parameter — the
claimsrequest parameter (OIDC Core §5.5) for requesting specific claims is not honored.