Kévin Chalet
|
7d90e1b9cb
|
Stop special-casing the prompt parameter in PAR-enabled authorization requests and update the samples to use TempData to determine whether the user should be redirected to the login endpoint
|
10 months ago |
Kévin Chalet
|
342b7651cf
|
Set NuGetAuditMode to "all" to enable vulnerable transitive dependencies warnings
|
11 months ago |
Kévin Chalet
|
bef75c4f56
|
Use the CreateAsyncScope() helper to avoid having to manually cast IServiceProvider to IAsyncDisposable
|
11 months ago |
Kévin Chalet
|
e39c635631
|
Decorate the claim extensions with [OverloadResolutionPriority] and collection expressions for ImmutableArray<T>
|
11 months ago |
Kévin Chalet
|
b17b3fe235
|
Update the .NET Framework and .NET Standard TFMs to target ASP.NET Core/Entity Framework Core 2.3 and .NET Extensions 8.0
|
11 months ago |
Kévin Chalet
|
42d6369910
|
Implement Pushed Authorization Requests (PAR) support and revamp the request caching feature
|
12 months ago |
Kévin Chalet
|
878569cd3f
|
Update the ASP.NET Core/OWIN hosts to support returning authentication properties for errored requests
|
1 year ago |
Kévin Chalet
|
f5721d0c2c
|
Rename the GetPrompts() and HasPrompt() extensions
|
1 year ago |
Kévin Chalet
|
74181aa1f5
|
Bump BouncyCastle, Quartz, Scriban and Wilson
|
1 year ago |
Kévin Chalet
|
e1f729ba0b
|
Validate prompt values specified in authorization requests and update the configuration endpoint to return "prompt_values_supported"
|
1 year ago |
Kévin Chalet
|
ef2e02ee23
|
Introduce a new .NET 9.0 TFM and use the new X509CertificateLoader API
|
1 year ago |
Kévin Chalet
|
d4c05e2e23
|
Rename the device, cryptography, logout and verification endpoints and the associated events/event handlers
|
1 year ago |
Kévin Chalet
|
aa6733b2df
|
Do not limit the error controller to a specific HTTP method
|
1 year ago |
Kévin Chalet
|
dde65e2ba4
|
Move the AddAssemblyAliasToReactiveAsync target to Directory.Build.targets
|
2 years ago |
Kévin Chalet
|
362a52fd14
|
Add a MAUI client sample
|
2 years ago |
Kévin Chalet
|
4f1566665a
|
Allow specifying an explicit code challenge method/grant type/response type/response mode per challenge when using OpenIddictClientService or the ASP.NET Core/OWIN integrations
|
2 years ago |
Kévin Chalet
|
34db799846
|
Update AuthenticationController.cs to include a warning indicating that ASP.NET Core Identity doesn't preserve external claims by default
|
2 years ago |
Kévin Chalet
|
6e836c4bb9
|
Update the ASP.NET Core samples to use Kestrel as the default HTTP server
|
2 years ago |
Kévin Chalet
|
b32eb8c0a2
|
Make user codes fully configurable and remove token length assumptions
|
2 years ago |
Kévin Chalet
|
3bc72160a4
|
Consider user codes invalid when no client_id claim could be resolved from the AuthenticateResult
|
2 years ago |
Kévin Chalet
|
3503ecd327
|
Update the console sandbox to support token refreshing/introspection/revocation with the resource owner password credentials grant
|
2 years ago |
Kévin Chalet
|
6bb44132b3
|
Update the system integration package to support interactive logout
|
2 years ago |
Kévin Chalet
|
491cf85d16
|
Add DocuSign to the list of supported providers
|
2 years ago |
Kévin Chalet
|
a5d2d867ba
|
Use List<T> instead of Enumerable.Any() in the samples
|
2 years ago |
Kévin Chalet
|
061e686be2
|
Remove the partial Startup class from the OpenIddict.Sandbox.AspNet.Server sample
|
2 years ago |
Kévin Chalet
|
4f09c587ab
|
Update the client stack to support standard token revocation
|
2 years ago |
Kévin Chalet
|
372eceab62
|
Add introspection support in the client stack
|
2 years ago |
Kévin Chalet
|
e896a0f8d4
|
Update the ASP.NET Core samples to target .NET Framework 4.8
|
2 years ago |
Kévin Chalet
|
e9eff303ef
|
Update MapStandardWebServicesFederationClaims to fall back to "name" when no "preferred_username" claim was found
|
2 years ago |
Kévin Chalet
|
570c7c3123
|
Update the AuthorizationController samples to validate the identity provider dynamically
|
2 years ago |
Kévin Chalet
|
f0650028fb
|
Bump the .NET SDK to 8.0.100 and add a .NET 8.0 TFM
|
2 years ago |
Kévin Chalet
|
6636784754
|
Add a .NET 8.0 TFM
|
2 years ago |
Kévin Chalet
|
d6c9c0b35c
|
Add client assertions support to the server stack
|
2 years ago |
Kévin Chalet
|
1c382d90ba
|
Introduce application settings and support configuring token lifetimes per client
|
2 years ago |
Kévin Chalet
|
4af3f8dc6f
|
Introduce support for application types
|
2 years ago |
Kévin Chalet
|
8f9c641dd6
|
Update the samples to store the provider name in the authentication cookie
|
2 years ago |
Kévin Chalet
|
3f9f16452f
|
Update the ASP.NET Core samples to use automatic authentication schemes
=
|
3 years ago |
Kévin Chalet
|
9deb68d433
|
Add an automatic claims mapping feature to the OpenIddict client stack
|
3 years ago |
Kévin Chalet
|
7d1c704848
|
Add a built-in authentication scheme forwarding feature to the OpenIddict client OWIN and ASP.NET Core hosts
|
3 years ago |
Kévin Chalet
|
fb78fb9d0d
|
Remove the Add[Provider]() overload returning a derived builder
|
3 years ago |
Kévin Chalet
|
64ade94294
|
Support multiple registrations with the same issuer/provider name and introduce client record models
|
3 years ago |
Kévin Chalet
|
4685332df5
|
Add device authorization grant support in the OpenIddict client
|
3 years ago |
Alexander Trauzzi
|
30c5db26f2
|
Replace Microsoft SQL Server by SQLite in the sandbox projects
|
3 years ago |
Kévin Chalet
|
ce1d49b3a6
|
Update the embedded web server to listen on 127.0.0.1/::1 when possible and use http://localhost/ as the default client URI
|
3 years ago |
Kévin Chalet
|
9b5075e656
|
Replace the client Windows integration by a cross-platform package and add HttpListener and WebAuthenticationBroker support
|
3 years ago |
Kévin Chalet
|
532a5941ec
|
Introduce Windows support for the client stack
|
3 years ago |
Kévin Chalet
|
6ed9eb25e1
|
Infer the redirection/post-logout redirection endpoint URIs from the redirect_uri/post_logout_redirect_uri configured in client registrations
|
3 years ago |
Kévin Chalet
|
8c14d4e3e9
|
Replace references to "URL" by "URI" when resource identifiers are not required to be resource locators
|
3 years ago |
Kévin Chalet
|
2a987bcebe
|
Support relative redirect_uri/post_logout_redirect_uri in the client stack and revisit how OpenIddict handles URIs
|
3 years ago |
Kévin Chalet
|
73e6efe4ac
|
Introduce a new DisableTransportSecurityRequirement() option in the OpenIddict client ASP.NET Core and OWIN hosts
|
3 years ago |