Skip to content

providers/oauth2: add logout+jwt token type for oidc logout token. (cherry-pick #19554 to version-2025.12)#19675

Merged
BeryJu merged 1 commit intoversion-2025.12from
cherry-pick/19554-to-version-2025.12
Jan 22, 2026
Merged

providers/oauth2: add logout+jwt token type for oidc logout token. (cherry-pick #19554 to version-2025.12)#19675
BeryJu merged 1 commit intoversion-2025.12from
cherry-pick/19554-to-version-2025.12

Conversation

@authentik-automation
Copy link
Contributor

Cherry-pick of #19554 to version-2025.12 branch.

Original PR: #19554
Original Author: @jeroen1602
Cherry-picked commit: 5c51ee5

…19554)

* providers/oauth2: add `logout+jwt` token type for oidc logout token.

The oidc back-channel logout spec recommends using explicitly typed JWTs using the `typ` parameter in the JWT's header.

[spec](https://openid.net/specs/openid-connect-backchannel-1_0.html#CrossJWT)

This may be a breaking change for some implementations if they were already checking the type of the token to be `JWT` (the default value).

* Apply suggestion from @BeryJu

Signed-off-by: Jens L. <jens@beryju.org>

---------

Signed-off-by: Jens L. <jens@beryju.org>
Co-authored-by: Jens L. <jens@beryju.org>
@codecov
Copy link

codecov bot commented Jan 22, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 93.28%. Comparing base (3beef73) to head (2239c4f).
⚠️ Report is 3 commits behind head on version-2025.12.
✅ All tests successful. No failed tests found.

Additional details and impacted files
@@                 Coverage Diff                 @@
##           version-2025.12   #19675      +/-   ##
===================================================
+ Coverage            93.26%   93.28%   +0.01%     
===================================================
  Files                  946      946              
  Lines                52288    52299      +11     
===================================================
+ Hits                 48769    48786      +17     
+ Misses                3519     3513       -6     
Flag Coverage Δ
e2e 44.48% <14.28%> (+<0.01%) ⬆️
integration 23.59% <7.14%> (-0.01%) ⬇️
unit 91.56% <100.00%> (+<0.01%) ⬆️
unit-migrate 91.61% <100.00%> (+<0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@github-actions
Copy link
Contributor

authentik PR Installation instructions

Instructions for docker-compose

Add the following block to your .env file:

AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-2239c4ff6d2ccf8fe6d6d631a8a0df3de00ef572
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s

Afterwards, run the upgrade commands from the latest release notes.

Instructions for Kubernetes

Add the following block to your values.yml file:

authentik:
    outposts:
        container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
global:
    image:
        repository: ghcr.io/goauthentik/dev-server
        tag: gh-2239c4ff6d2ccf8fe6d6d631a8a0df3de00ef572

Afterwards, run the upgrade commands from the latest release notes.

@BeryJu BeryJu merged commit e7d09e8 into version-2025.12 Jan 22, 2026
87 of 91 checks passed
@BeryJu BeryJu deleted the cherry-pick/19554-to-version-2025.12 branch January 22, 2026 14:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants