Known issues in this release of the OpenID Connect Provider from BankID are further described below in terms of:
...
The following table summarizes restrictions in the latest this release of OIDC Provider from BankIDBankID :
No | Restrictions in OIDC_BID_0.9_Pilot | ||
---|---|---|---|
R1 | The AML Service currently does not provide residential address from the National Registry. The service does until further return address information from available sources at Bisnode. | R2 | Refresh Tokens are not supported |
R2 | BankID (including BankID on mobile) is the only supported IDP. No Value Added Sevices (VAS) are supported. Future releases will support additional IDPs and VAS-services | ||
R3 | Signing with the BankID IDP is currently not supported over OpenID Connect. Such support is planned for a future release. | ||
R4 | The BankID anti-fraud service is currently not supported over OpenID Connect. Such support is planned for a future release. | ||
R5 | Indirectly connected clients of the known-type via Intermediate Services are currently not supported. Such support is planned for a future release. | ||
R3 | Some R6 | OIDC client_secret_basic is currently the only supported authentication method for OIDC Clients are not supportedR4. Other authentication methods may be added on customer demand. | |
R7 | Pure app-based applications using a completely embedded (API-based) user-experience is currently not supported. Such support is planned for a future release. | ||
R6 | POST method is not supported by Authorize endpoint | ||
R7 | Offline Refresh Tokens via the offline_access scope is currently not provided | ||
R8 |
| ||
R9 | The AML Service currently does not support search based on D-number. | ||
R10 | Implicit flow (and hybrid flow) is not supported. Se Message flow details. | ||
R8 | A JS Connector to simplify integration for front-end applications is not supported |
Caveats
The following table summarizes caveats and know issues in the latest this release of the OIDC Provider from BankID:
No | Caveats in OIDC_BID_0.9_Pilot |
---|---|
C1 | The |
profile
is provided along with the scope aml_person/basic
in requests to the authorize endpoint.nnin_altsub
claim is never part of an Access Token regardless of the presence of this claim in the corresponding ID Token. Resource Servers that are entitled to receive nnin_altsub
must be configred to for such access and retrieve this claim via introspection The default userinfo endpoint in Keyacloak <oidc-baseurl>/protocol/openid-connect/userinfo is replaced by a corresponding userinfo endpoint for TINFO. The latter must be used and is reported in .well-knowi/openid-configuration. The default Keycloack userinfo still responds but does not contain any data that is not already part of the ID Token.
aud
claim in Access Tokens and Refresh Tokens has a singelton-format and not a list-format (with a single entry) if there is only one audience involved. Hence, implementors must deal with both singelton-values and list-values for this claim.doInit
oauth_url
parameter which then redirects to the proper Authorize endpoint. This way the window is opened on your own domain and cross domain messaging should work.doConnect
in certain cases. This is probably due to doInit
not being called before doConnect
is called for some reason. The oidc-connector-loaded
event waits for the page to be loaded before firing. For example, if you call doInit
when the OIDC loaded event fires, then if the page load slowly you may have a small window where doConnect
is triggered before the doInit
call was made. A workaround could be to always call doInit
before doConnect or go for synchronous loading.TINFO-service is a rudimentary early-release that will change significantly in a future verion | |
C2 | The TINFO-service is implemented via the Userinfo endpoint and integrated in the OIDC Provider itself. The TINFO-service will be implemented as a stand-alone OAuth2 Resouces Sever in a future release |
Bugs
The following table summarizes known bugs in the latest caveats and know issues in this release of the OIDC Provider from BankID:
No | Bugs |
---|---|
B1 | Language is sometimes not set according to the ui_locales parameter |
B2 | The error response from TINFO Userinfo is not according to standard |
B5 | There is a small anomaly with styling of OIDC-client in Microsoft Edge 41in OIDC_BID_0.9_Pilot |
B1 |
|