<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Tenant Issuer configuration might not follow the OIDC specification]]></title><description><![CDATA[<p dir="auto">I'm not sure if this qualifies as a bug or a documentation issue (or neither), but there's a potential problem with the advice when setting up a tenant.</p>
<p dir="auto">Under the tenant settings, you set the token issuer - and it advises you to use the FQDN of your domain. The example given is "<a href="http://fusionauth.io" rel="nofollow ugc">fusionauth.io</a>". This issuer winds up in the OIDC Autodiscovery config and I believe the "iss" field of the ID Token. So, if you set it to "<a href="http://fusionauth.io" rel="nofollow ugc">fusionauth.io</a>" you'll wind up with this:</p>
<pre><code class="language-json">{
  ...
  "issuer" : "fusionauth.io",
  
}
</code></pre>
<p dir="auto">Issuer, according to the spec (<a href="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata" rel="nofollow ugc">https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata</a>), must include the scheme:</p>
<blockquote>
<p dir="auto">REQUIRED. URL using the https scheme with no query or fragment components that the OP asserts as its Issuer Identifier. If Issuer discovery is supported (see Section 2), this value MUST be identical to the issuer value returned by WebFinger. This also MUST be identical to the iss Claim value in ID Tokens issued from this Issuer.</p>
</blockquote>
<p dir="auto">So, that breaks some OIDC Clients rhat strictly adhere to the spec (I tried it with npm's <code>openid-client</code> but there are likely others).</p>
<p dir="auto">The spec for the "iss" stanza of ID tokens also needs the scheme: <a href="https://openid.net/specs/openid-connect-core-1_0.html#IDToken" rel="nofollow ugc">https://openid.net/specs/openid-connect-core-1_0.html#IDToken</a></p>
<p dir="auto">Related point, if you use the Tenant's autodiscovery URL, e.g. <code>https://fusionauth.io/{tentant_id}/.well-known/openid-configuration</code>, OIDC clients will generally expect the issuer to include the {tenant_id} as well and try to validate against that. Here's an example from an Okta dev tenant: <a href="https://dev-06212286.okta.com/oauth2/ausmf0ocf2mJ2g4Yq5d7/.well-known/openid-configuration" rel="nofollow ugc">https://dev-06212286.okta.com/oauth2/ausmf0ocf2mJ2g4Yq5d7/.well-known/openid-configuration</a></p>
<p dir="auto">The docs (<a href="https://fusionauth.io/docs/get-started/core-concepts/tenants" rel="nofollow ugc">https://fusionauth.io/docs/get-started/core-concepts/tenants</a>) don't mention any of this - just says FQDN (which does not include a scheme), so while you can configure your Tenant appropriately it's fairly easy to misconfigure it. Might be worth mentioning this somewhere or validating that the issuer (if possible) contains the scheme.</p>
<p dir="auto">I don't actually know if that was present in earlier drafts of the OIDC spec.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/2854/tenant-issuer-configuration-might-not-follow-the-oidc-specification</link><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 14:28:35 GMT</lastBuildDate><atom:link href="https://fusionauth.io/community/forum/topic/2854.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 28 Jan 2025 23:17:09 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Tenant Issuer configuration might not follow the OIDC specification on Mon, 17 Mar 2025 13:42:31 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/56">@maciej-wisniowski</a> Looks like you are getting some traction on the issue. Thanks for taking the time to work through this and submit the issue to make FusionAuth better.</p>
]]></description><link>https://fusionauth.io/community/forum/post/7898</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/7898</guid><dc:creator><![CDATA[mark.robustelli]]></dc:creator><pubDate>Mon, 17 Mar 2025 13:42:31 GMT</pubDate></item><item><title><![CDATA[Reply to Tenant Issuer configuration might not follow the OIDC specification on Fri, 14 Mar 2025 08:32:53 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/3425">@cabaral109</a> <a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/2507">@mark-robustelli</a> after spending few hours debugging issue with openid-client I found this topic and lack of the protocol part in the issuer field to be a reason. I've just submitted the issue at: <a href="https://github.com/FusionAuth/fusionauth-issues/issues/3021" rel="nofollow ugc">https://github.com/FusionAuth/fusionauth-issues/issues/3021</a></p>
]]></description><link>https://fusionauth.io/community/forum/post/7887</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/7887</guid><dc:creator><![CDATA[maciej.wisniowski]]></dc:creator><pubDate>Fri, 14 Mar 2025 08:32:53 GMT</pubDate></item><item><title><![CDATA[Reply to Tenant Issuer configuration might not follow the OIDC specification on Thu, 20 Feb 2025 02:38:47 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/3398">@cthos</a></p>
<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/3398">@cthos</a> said in <a href="/community/forum/post/7778">Tenant Issuer configuration might not follow the OIDC specification</a>:</p>
<blockquote>
<p dir="auto">I'm not sure if this qualifies as a bug or a documentation issue (or neither), but there's a potential problem with the advice when setting up a tenant.</p>
<p dir="auto">Under the tenant settings, you set the token issuer - and it advises you to use the FQDN of your domain. The example given is "<a href="http://fusionauth.io" rel="nofollow ugc">fusionauth.io</a>". This issuer winds up in the OIDC Autodiscovery config and I believe the "iss" field of the ID Token. So, if you set it to "<a href="http://fusionauth.io" rel="nofollow ugc">fusionauth.io</a>" you'll wind up with this:</p>
<pre><code class="language-json">{
  ...
  "issuer" : "fusionauth.io",
  
}
</code></pre>
<p dir="auto">Issuer, according to the spec (<a href="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata" rel="nofollow ugc">https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata</a> <a href="https://fngames.io/" rel="nofollow ugc">fnaf</a>)</p>
<blockquote></blockquote>
<p dir="auto">, must include the scheme:</p>
<blockquote>
<p dir="auto">REQUIRED. URL using the https scheme with no query or fragment components that the OP asserts as its Issuer Identifier. If Issuer discovery is supported (see Section 2), this value MUST be identical to the issuer value returned by WebFinger. This also MUST be identical to the iss Claim value in ID Tokens issued from this Issuer.</p>
</blockquote>
<p dir="auto">So, that breaks some OIDC Clients rhat strictly adhere to the spec (I tried it with npm's <code>openid-client</code> but there are likely others).</p>
<p dir="auto">The spec for the "iss" stanza of ID tokens also needs the scheme: <a href="https://openid.net/specs/openid-connect-core-1_0.html#IDToken" rel="nofollow ugc">https://openid.net/specs/openid-connect-core-1_0.html#IDToken</a></p>
</blockquote>
<p dir="auto">The current documentation mentions FQDN (Fully Qualified Domain Name) without explicitly stating the need for a scheme. This could lead to misconfigurations if users are unaware that the issuer should include the scheme.  It would be beneficial to update the documentation to clarify that the issuer must include both the scheme and the tenant ID. This could help prevent common setup issues.</p>
]]></description><link>https://fusionauth.io/community/forum/post/7853</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/7853</guid><dc:creator><![CDATA[cabaral109]]></dc:creator><pubDate>Thu, 20 Feb 2025 02:38:47 GMT</pubDate></item><item><title><![CDATA[Reply to Tenant Issuer configuration might not follow the OIDC specification on Thu, 20 Feb 2025 14:47:19 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/3398">@cthos</a> Thanks for the feedback. Since it does appear that you can configure as required, I'm not sure this constitutes a bug.  However if it is confusing to you it is likely to others as well.  It may be worth <a href="https://github.com/FusionAuth/fusionauth-issues" rel="nofollow ugc">opening an issue</a> for the dev team to take a look at.</p>
]]></description><link>https://fusionauth.io/community/forum/post/7797</link><guid isPermaLink="true">https://fusionauth.io/community/forum/post/7797</guid><dc:creator><![CDATA[mark.robustelli]]></dc:creator><pubDate>Thu, 20 Feb 2025 14:47:19 GMT</pubDate></item></channel></rss>