-
Notifications
You must be signed in to change notification settings - Fork 156
Closed
Labels
EnhancementA request or suggestion to improve some aspect of the libraryA request or suggestion to improve some aspect of the libraryFeature RequestRequest for new functionalityRequest for new functionalityconfidential-clientFor issues related to confidential client appsFor issues related to confidential client apps
Description
MSAL client type
Confidential
Problem Statement
When MSAL creates the client assertion, it uses PKCS1 padding for digital signature and SHA1 as x5t claim. These are old crypto algorithms and we need to move to newer versions. The STS is building support.
See ESTS work items :
https://identitydivision.visualstudio.com/Engineering/_workitems/edit/2655345
https://identitydivision.visualstudio.com/Engineering/_workitems/edit/2704466
Proposed solution
Use x5t#s256 and PSS padding when talking to ESTS, CIAM, B2C(?) but not with ADFS.
Original issue: AzureAD/microsoft-authentication-library-for-dotnet#4428
Metadata
Metadata
Assignees
Labels
EnhancementA request or suggestion to improve some aspect of the libraryA request or suggestion to improve some aspect of the libraryFeature RequestRequest for new functionalityRequest for new functionalityconfidential-clientFor issues related to confidential client appsFor issues related to confidential client apps
Type
Projects
Status
Done (in PR or next release)