Skip to content

OpenID Connect Core 1.0

Spec: openid.net/specs/openid-connect-core-1_0.htmlStatus: Partial

OpenID Connect Core layers identity semantics on top of OAuth 2.0: ID tokens, the UserInfo endpoint, and standard claims.

Implemented

  • Authorization Code Flowresponse_type=code, with an ID token returned from the token endpoint.
  • Hybrid Flowcode id_token, code token, code token id_token.
  • Implicit Flow response typesid_token and token id_token are accepted, though direct implicit is discouraged.
  • ID Token — signed RS256 JWT containing iss, sub, aud, exp, iat, auth_time, nonce, acr when requested.
  • Nonce — round-tripped and validated to prevent replay.
  • max_age / auth_time — enforced per OIDC Core §3.1.2.1; re-authentication is required when the existing session is older than max_age.
  • acr_values — forwarded and echoed into the ID token.
  • UserInfo endpointGET and POST /userinfo, scope-filtered (openid, profile, email, address, phone).
  • Standard claimssub, email, email_verified, name, given_name, family_name, middle_name, nickname, preferred_username, profile, picture, website, gender, birthdate, zoneinfo, locale, phone_number, phone_number_verified, address (per §5.1.1).
  • promptnone, login, consent, and select_account behaviors.

Partial / not yet implemented

  • Request Objectsrequest and request_uri parameters are advertised as unsupported (request_parameter_supported: false, request_uri_parameter_supported: false).
  • Pairwise subject identifiers — only public subject type is supported.
  • Client authentication with private_key_jwt — not yet implemented.
  • Claims parameter — the claims request parameter (OIDC Core §5.5) for requesting specific claims is not honored.

Released under the MIT License.