Skip to content

SDKS-4231 Implement Pushed Authorization Request (PAR) support for OIDC#176

Open
witrisna wants to merge 1 commit intodevelopfrom
SDKS-4231
Open

SDKS-4231 Implement Pushed Authorization Request (PAR) support for OIDC#176
witrisna wants to merge 1 commit intodevelopfrom
SDKS-4231

Conversation

@witrisna
Copy link
Copy Markdown
Contributor

JIRA Ticket

SDKS-4231

Description

Introduced support for PAR (RFC 9126) to improve security and handle large authorization request payloads by pushing parameters to the server prior to authorization.

Key changes:

  • Added par configuration flag to OidcClientConfig and updated OpenIdConfiguration to include the pushed_authorization_request_endpoint.
  • Refactored authorization request building logic into buildAuthorizeParams and updated populateRequest to handle both standard and PAR flows.
  • Implemented PAR logic to POST parameters to the provider and utilize the returned request_uri in the subsequent authorization call.
  • Updated Agent.kt in the Journey module to use the centralized populateRequest logic, ensuring PAR support is available across modules.
  • Added comprehensive unit and integration tests in DaVinciTest, JourneyTest, and OidcWebClientTest to verify PAR execution and parameter handling.
  • Updated license headers to include 2026.

@witrisna witrisna self-assigned this Mar 31, 2026
@codecov
Copy link
Copy Markdown

codecov bot commented Mar 31, 2026

Codecov Report

❌ Patch coverage is 14.89362% with 40 lines in your changes missing coverage. Please review.
✅ Project coverage is 43.92%. Comparing base (608af4f) to head (e52de65).

Files with missing lines Patch % Lines
...kotlin/com/pingidentity/oidc/module/OidcRequest.kt 0.00% 38 Missing ⚠️
...n/kotlin/com/pingidentity/oidc/OidcClientConfig.kt 0.00% 2 Missing ⚠️
Additional details and impacted files
@@              Coverage Diff               @@
##             develop     #176       +/-   ##
==============================================
+ Coverage      27.66%   43.92%   +16.25%     
- Complexity       901     1218      +317     
==============================================
  Files            299      305        +6     
  Lines           8957     9209      +252     
  Branches        1272     1309       +37     
==============================================
+ Hits            2478     4045     +1567     
+ Misses          6195     4630     -1565     
- Partials         284      534      +250     
Flag Coverage Δ
integration-tests 26.46% <10.63%> (?)
unit-tests 24.89% <4.25%> (-2.77%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Introduced support for PAR (RFC 9126) to improve security and handle large authorization request payloads by pushing parameters to the server prior to authorization.

Key changes:
- Added `par` configuration flag to `OidcClientConfig` and updated `OpenIdConfiguration` to include the `pushed_authorization_request_endpoint`.
- Refactored authorization request building logic into `buildAuthorizeParams` and updated `populateRequest` to handle both standard and PAR flows.
- Implemented PAR logic to POST parameters to the provider and utilize the returned `request_uri` in the subsequent authorization call.
- Updated `Agent.kt` in the Journey module to use the centralized `populateRequest` logic, ensuring PAR support is available across modules.
- Added comprehensive unit and integration tests in `DaVinciTest`, `JourneyTest`, and `OidcWebClientTest` to verify PAR execution and parameter handling.
- Updated license headers to include 2026.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Development

Successfully merging this pull request may close these issues.

1 participant