Owncloud desktop throws failed to verify access token: token has invalid claims: token has invalid issuer with PROXY_OIDC_ACCESS_TOKEN_VERIFY_METHOD=jwt and authentik

My owncloud infinite scale + authentik deployment throws errors when I try to log in with the desktop app and the following is set

PROXY_OIDC_ACCESS_TOKEN_VERIFY_METHOD=jwt

Expected behaviour

It should log in

Actual behaviour

I get invalid credentials error and the logs in ocis says the following

2025-10-17T16:39:20Z ERR failed to authenticate the request | service=proxy error=failed to verify access token: token has invalid claims: token has invalid issuer authenticator=oidc path=/remote.php/webdav/ user_agent=Mozilla/5.0 (Linux) mirall/6.0.1.17343 (ownCloud, fedora-6.16.11-200.fc42.x86_64 ClientArchitecture: x86_64 OsArchitecture: x86_64) client.address=10.0.0.7 network.peer.address= network.peer.port= line=github.com/owncloud/ocis/v2/services/proxy/pkg/middleware/oidc_auth.go:198

Steps to reproduce

  1. Set PROXY_OIDC_ACCESS_TOKEN_VERIFY_METHOD=jwt;

  2. Try logging in with the desktop app

  3. Logs in fine on the browser; but the app says Invalid Credentials

Server configuration

Operating system: Debian 12

ownCloud version: Infinite scale 7.3.0

Client configuration

Client version: 6.0.1.17343-1

Operating system: Fedora

OS language: EN-US

Logs

Please use Gist (https://gist.github.com/) or a similar code paster for longer
logs.

Template for output < 10 lines

  1. ownCloud 6.0.1.17343 63ace8 Libraries Qt 6.8.3, OpenSSL 3.4.1 11 Feb 2025 Using virtual files plugin: suffix OS: fedora-6.16.11-200.fc42.x86_64 (build arch: x86_64, CPU arch: x86_64) QPA: wayland ownCloud
    
    
  2. 2025-10-17T16:39:20Z ERR failed to authenticate the request | service=proxy error=failed to verify access token: token has invalid claims: token has invalid issuer authenticator=oidc path=/remote.php/webdav/ user_agent=Mozilla/5.0 (Linux) mirall/6.0.1.17343 (ownCloud, fedora-6.16.11-200.fc42.x86_64 ClientArchitecture: x86_64 OsArchitecture: x86_64) client.address=10.0.0.7 network.peer.address= network.peer.port= line=github.com/owncloud/ocis/v2/services/proxy/pkg/middleware/oidc_auth.go:198
    

the issuer is mismatched because its set to the slug of the web version, when I set it to be same for all providers I am not sure what else to set so that ocis know where to make the token request/well-known request to

There must be a way to properly configure this, setting the method to jwt meants the
desktop uses the same
OCIS_OIDC_ISSUER url (which is web ui)
authentik has issuer set to be the OCIS_OIDC_ISSUER url
doesn’t work since jwt issuer is also OCIS_OIDC_ISSUER but the expectation is desktop?