Commit graph

24 commits

Author SHA1 Message Date
Andy Clayton
9d5c2b39fa support introspection on client credentials tokens
The response can simply omit fields that require id_token as the only
required field is "active" according to RFC 7662. I think it would be
nice for introspection of client credentials tokens to be supported by
default without needing to override
OIDC_INTROSPECTION_VALIDATE_AUDIENCE_SCOPE, but this is a start.
2018-07-06 11:41:09 -05:00
Tuomas Suutari
c95497dbd9 Remove scope param from OIDC_IDTOKEN_PROCESSING_HOOK
There is no need to pass in the scope parameter separately, since the
scope is available via the token parameter already.
2018-05-31 10:23:58 +03:00
Juan Ignacio Fiorentino
acc3cf588b
Update settings.rst 2018-05-28 12:38:53 -03:00
Tuomas Suutari
7eb31574ee Document the new ID token processing hook parameters 2018-05-24 09:31:07 +03:00
Juan Ignacio Fiorentino
5a65ac17f9
Replace resource with client in docs. 2018-04-24 11:10:27 -03:00
Maxim Daniline
20a355d9f5 Update settings docs to add extra introspection setting 2018-04-24 10:09:49 +01:00
Maxim Daniline
180aad9a36 Add token introspection endpoint to satisfy https://tools.ietf.org/html/rfc7662 2018-04-23 10:47:01 +01:00
Juan Ignacio Fiorentino
56ad376518 Merge branch 'feature/token_retun_claims' of https://github.com/dhrp/django-oidc-provider into dhrp-feature/token_retun_claims 2018-04-10 18:41:38 -03:00
Reinout van Rees
bb218dbc56 Sphinx documentation fixes (#219)
* Small wording change + fix in example template code

* Added note about UserConsent not being in the admin

* Mostly spelling corrections and phrasing changes

* Moved template context explation from the settings to the templates page

* Changed wording

* Changed wording
2017-12-14 18:30:46 +01:00
Wojciech Bartosiak
a829726be8 Merge develop to v0.5.x (#179)
* Log create_uri_response exceptions to logger.exception

* Support grant type password - basics

* Add tests for Resource Owner Password Credentials Flow

* Password Grant -Response according to specification

* Better tests for errors, disable grant type password by default

* Add documentation for grant type password

* User authentication failure to return 403

* Add id_token to response

* skipping consent only works for confidential clients

* fix URI fragment

example not working URL `http://localhost:8100/#/auth/callback/`

* OIDC_POST_END_SESSION_HOOK + tests

* Explicit function naming

* Remove print statements

* No need for semicolons, this is Python

* Update CHANGELOG.md

* fixed logger message

* Improved `exp` value calculation

* rename OIDC_POST_END_SESSION_HOOK to OIDC_AFTER_END_SESSION_HOOK

* added docs for OIDC_AFTER_END_SESSION_HOOK

*  Replaces `LOGIN_URL` with `OIDC_LOGIN_URL`
so users can use a different login path for their oidc requests.

* Adds a setting variable for custom template paths

* Updates documentation

* Fixed bad try/except/finally block

* Adds test for OIDC_TEMPLATES settings

* Determine value for op_browser_state from session_key or default

* Do not use cookie for browser_state. It may not yet be there

* Add docs on new setting

OIDC_UNAUTHENTICATED_SESSION_MANAGEMENT_KEY

* Fix compatibility for older versions of Django

* solved merging typo for missing @property
2017-05-05 05:19:57 +02:00
kaveh
b164388e15 Adds per-client consent customization 2017-04-11 13:16:06 -07:00
Ignacio Fiorentino
2ec9cbe334 Fix wrong link in docs. 2016-11-02 12:35:22 -03:00
Ignacio Fiorentino
d9149b162d Add initial doc for session management. 2016-10-28 16:56:06 -03:00
Ignacio Fiorentino
72bdeb0b3c Update docs. 2016-09-19 18:05:29 -03:00
Ignacio Fiorentino
a0f95446bb Fix docs. 2016-09-12 13:07:12 -03:00
Ignacio Fiorentino
dc9ec1863e Change setting OIDC_USERINFO. 2016-07-07 12:50:27 -03:00
Ignacio Fiorentino
4cc7474c19 Add verbose name and description for scopes. 2016-06-16 17:18:39 -03:00
Ignacio Fiorentino
eea590e006 Modify scope claims class. 2016-05-30 13:28:07 -03:00
Ignacio Fiorentino
de3da208ee Update docs. 2016-05-26 17:05:16 -03:00
Wojciech Bartosiak
7cb5b4d54e str or list or tuple for OIDC_ID_TOKEN_PROCESSING_HOOK 2016-03-01 17:54:57 +00:00
Wojciech Bartosiak
0a2ee70dae Fixed type in return 2016-02-18 13:17:04 +00:00
Wojciech Bartosiak
3e772b3161 added 'user' into default_idtoken_processing_hook 2016-02-17 22:25:02 +00:00
Wojciech Bartosiak
d69828b8db Extended description of OIDC_IDTOKEN_PROCESSING_HOOK 2016-02-17 22:16:39 +00:00
juanifioren
7fb57ee7a1 Modify docs. 2016-02-12 16:22:47 -03:00
Renamed from docs/settings.rst (Browse further)