I'd like to raise the issue that the token validation present in Keycloak
Gatekeeper is incorrectly implemented. Currently, the access token is
validated *as if it were an ID token*, if it is defined in the reply to
/oauth/callback. This behavior is the result of substituting the ID token
with the access token, if present , and then validating it .
The OpenID Connect specification require that several fields (such as iss,
sub and aud) are present in the ID token . Therefore, the presence of
these fields should be validated for the ID token , and NOT for the
access token .
Since the wrong access token is validated in Gatekeeper, OpenID Connect
providers that do not supply the mandatory ID token fields in the access
token are rejected, making them incompatible with Gatekeeper.
What are your opinion on this matter? I would like this issue resolved so
that more OpenID Connect providers can be used together with Gatekeeper in