Florent Jouatte
2872d2e10b
#113 : tiny improvement
2016-08-17 12:24:00 +02:00
Florent Jouatte
2c1d582475
#113 : omit claim when empty
2016-08-17 12:13:33 +02:00
Graham Ullrich
ba4faee6ef
Fix global imports
...
Global imports ("from X import *") are discouraged in Python.
2016-08-11 16:05:13 -06:00
Graham Ullrich
ffddb69f80
Add tests for at_hash
...
Ensure at_hash is present in id_token when warranted.
2016-08-08 11:24:07 -06:00
Brian Rosner
afc3a60ee7
Added at_hash when access token is present
...
This is required by response type "id_token token", but can be
used by other flows if they choose.
2016-08-05 14:00:00 -06:00
Ignacio Fiorentino
dc9ec1863e
Change setting OIDC_USERINFO.
2016-07-07 12:50:27 -03:00
Ignacio Fiorentino
4cc7474c19
Add verbose name and description for scopes.
2016-06-16 17:18:39 -03:00
Ignacio Fiorentino
5255719700
Add date_given to UserConsent model. Add verbose names in models.
2016-06-13 12:15:10 -03:00
Ignacio Fiorentino
eea590e006
Modify scope claims class.
2016-05-30 13:28:07 -03:00
Si Feng
be5656bcf4
Make SITE_URL
optional.
2016-05-25 14:58:58 -07:00
Ignacio Fiorentino
497f2f3a68
Bump version v0.3.3.
2016-05-03 12:17:22 -03:00
Ignacio Fiorentino
9f9df355a3
Merge branch 'v0.3.x' of https://github.com/juanifioren/django-oidc-provider into feature-jwtalg
2016-04-25 14:55:30 -03:00
Ignacio Fiorentino
61f0c209af
Refactoring prompt=none logic.
2016-04-13 17:19:37 -03:00
Ignacio Fiorentino
b05894bf6d
Add prompt parameter to authorize view.
2016-04-12 18:19:16 -03:00
Ignacio Fiorentino
e97c32acd1
Fix encoding problem when using Py34.
2016-04-08 13:22:05 -03:00
Ignacio Fiorentino
e495d6c41d
Remplace AES encryption with database. For saving PKCE parameters.
2016-04-07 16:18:47 -03:00
Ignacio
b1b8247cb0
Add hidden inputs for PKCE. Fix bug with AES.
2016-04-07 11:45:35 -03:00
Ignacio Fiorentino
6e8af74f76
First intent to implement PKCE.
2016-04-06 18:03:30 -03:00
Ignacio Fiorentino
dff76cd1ea
Add HS256 support for JWS.
2016-03-22 16:17:56 -03:00
Nick Mohoric
f8dce31fa2
Changed logging from error to debug
2016-03-17 14:31:41 -04:00
Wojciech Bartosiak
08033bb9ad
Fix missing verification of response type for client
2016-03-08 13:21:55 +00:00
Wojciech Bartosiak
7cb5b4d54e
str or list or tuple for OIDC_ID_TOKEN_PROCESSING_HOOK
2016-03-01 17:54:57 +00:00
Ignacio
a4d5f89536
Merge branch 'v0.2.x' of https://github.com/juanifioren/django-oidc-provider into v0.3.x
...
Conflicts:
oidc_provider/lib/utils/common.py
oidc_provider/lib/utils/token.py
2016-02-25 10:10:07 -03:00
Ilya
49e19e7493
ID_TOKEN_PROCESSING_HOOK gets user argument
2016-02-25 09:46:10 +00:00
Wojciech Bartosiak
a28db60d9e
added 'user' into default_idtoken_processing_hook
2016-02-17 22:24:02 +00:00
Wojciech Bartosiak
eb7686abba
added 'user' into default_idtoken_processing_hook
2016-02-17 22:23:10 +00:00
juanifioren
25a59c8344
Refactoring supporting OAuth2 flow.
2016-02-16 17:33:12 -03:00
juanifioren
8eb0877d89
Refactoring userinfo endpoint. Create decorator "oauth2.protected_resource_view".
2016-02-15 17:13:19 -03:00
juanifioren
782befd6ec
Rename setting.
2016-02-12 14:51:43 -03:00
Wojciech Bartosiak
7a357001b6
Added OIDC_ID_TOKEN_PROCESSING_HOOK functionality
2016-02-12 16:02:35 +00:00
juanifioren
998ea5fcd1
Implementation of RSA Keys using Models. Also providing DOC.
2016-01-25 17:52:24 -03:00
juanifioren
73ece1bf64
Make OIDC_AFTER_USERLOGIN_HOOK to be lazy imported by string.
2016-01-19 17:37:32 -03:00
juanifioren
c6534db693
Add nonce validation for Implicit Flow.
2016-01-19 16:05:34 -03:00
Pablo SEMINARIO
9204c478ed
Fix #72 get_issuer() returns a wrong value
2016-01-16 11:35:26 +01:00
juanifioren
ccd9836edb
Make OIDC_IDTOKEN_SUB_GENERATOR to be lazy imported by the location of the function.
2016-01-12 15:17:22 -03:00
juanifioren
8b0d869f7b
Replace django redirect with custom HttpResponse object.
2015-11-12 17:12:18 -03:00
juanifioren
9a685a7afa
Merge from ByteInternet:refresh-tokens
2015-09-30 12:59:08 -03:00
Maarten van Schaik
893a877b76
Upgrade pyjwkest to version > 1.0.3
...
There have been some issues in Python 3 where elements of the id_token
were left when encoding the token. Cause was incorrect encoding logic in
pyjwkest. Version 1.0.3 has improved encoding handling.
2015-09-30 17:31:49 +02:00
Maarten van Schaik
f4dfa7303f
Forget old token when a refresh token is used
2015-09-30 16:46:33 +02:00
Maarten van Schaik
8d672cc1ba
Add support for refresh_token to token endpoint
2015-09-30 14:55:48 +02:00
juanifioren
5311888520
Merge branch 'v0.1.x' of https://github.com/juanifioren/django-oidc-provider into v0.2.x
...
Conflicts:
README.rst
2015-08-12 15:21:57 -03:00
Rob Sung
19313e8145
Fxed: ID token does not contain kid #42
2015-08-11 23:50:05 -04:00
juanifioren
5020ccde80
Add custom user info model feature.
2015-08-11 15:58:52 -03:00
juanifioren
8040dd7670
Remove unnecessary property in error class.
2015-08-03 15:09:12 -03:00
juanifioren
7658257d18
Refactoring in discovery.
2015-07-31 14:19:53 -03:00
juanifioren
6c4dad8c5c
Imports in alphabetical order.
2015-07-30 15:49:12 -03:00
juanifioren
870c605211
Add HTTP Basic client auth in token endpoint.
2015-07-30 15:47:50 -03:00
juanifioren
87b0deb357
Merge branch 'v0.1.x' of https://github.com/juanifioren/django-oidc-provider
2015-07-28 15:56:00 -03:00
juanifioren
253527aa52
Refactoring in authorize endpoint.
2015-07-28 15:55:30 -03:00
juanifioren
92b75ba1d9
Sending access_token as query string parameter in UserInfo.
2015-07-27 18:28:12 -03:00