Kévin Chalet
|
9a74ea5e4f
|
Remove unnecessary view models
|
8 months ago |
Kévin Chalet
|
8c94cb7c13
|
Implement OAuth 2.0 Token Exchange support
|
8 months ago |
Kévin Chalet
|
b8315727b8
|
Enable nullable references support in the ASP.NET Core samples
|
8 months ago |
Kévin Chalet
|
b72bfd2c40
|
Update the samples to clarify the relationship between the expiration of the authentication results returned by OpenIddict and the lifetime of authentication cookies based on them
|
8 months ago |
Kévin Chalet
|
f8553a9ee7
|
Update the MapNonStandardResponseParameters userinfo handler to avoid using OpenIddictParameter.GetNamedParameters()
|
9 months ago |
Kévin Chalet
|
7d90e1b9cb
|
Stop special-casing the prompt parameter in PAR-enabled authorization requests and update the samples to use TempData to determine whether the user should be redirected to the login endpoint
|
10 months ago |
Kévin Chalet
|
e39c635631
|
Decorate the claim extensions with [OverloadResolutionPriority] and collection expressions for ImmutableArray<T>
|
11 months ago |
Kévin Chalet
|
b17b3fe235
|
Update the .NET Framework and .NET Standard TFMs to target ASP.NET Core/Entity Framework Core 2.3 and .NET Extensions 8.0
|
11 months ago |
Kévin Chalet
|
42d6369910
|
Implement Pushed Authorization Requests (PAR) support and revamp the request caching feature
|
12 months ago |
Kévin Chalet
|
f5721d0c2c
|
Rename the GetPrompts() and HasPrompt() extensions
|
1 year ago |
Kévin Chalet
|
e1f729ba0b
|
Validate prompt values specified in authorization requests and update the configuration endpoint to return "prompt_values_supported"
|
1 year ago |
Kévin Chalet
|
d4c05e2e23
|
Rename the device, cryptography, logout and verification endpoints and the associated events/event handlers
|
1 year ago |
Kévin Chalet
|
aa6733b2df
|
Do not limit the error controller to a specific HTTP method
|
1 year ago |
Kévin Chalet
|
34db799846
|
Update AuthenticationController.cs to include a warning indicating that ASP.NET Core Identity doesn't preserve external claims by default
|
2 years ago |
Kévin Chalet
|
b32eb8c0a2
|
Make user codes fully configurable and remove token length assumptions
|
2 years ago |
Kévin Chalet
|
3bc72160a4
|
Consider user codes invalid when no client_id claim could be resolved from the AuthenticateResult
|
2 years ago |
Kévin Chalet
|
a5d2d867ba
|
Use List<T> instead of Enumerable.Any() in the samples
|
2 years ago |
Kévin Chalet
|
061e686be2
|
Remove the partial Startup class from the OpenIddict.Sandbox.AspNet.Server sample
|
2 years ago |
Kévin Chalet
|
e896a0f8d4
|
Update the ASP.NET Core samples to target .NET Framework 4.8
|
2 years ago |
Kévin Chalet
|
e9eff303ef
|
Update MapStandardWebServicesFederationClaims to fall back to "name" when no "preferred_username" claim was found
|
2 years ago |
Kévin Chalet
|
570c7c3123
|
Update the AuthorizationController samples to validate the identity provider dynamically
|
2 years ago |
Kévin Chalet
|
8f9c641dd6
|
Update the samples to store the provider name in the authentication cookie
|
2 years ago |
Kévin Chalet
|
3f9f16452f
|
Update the ASP.NET Core samples to use automatic authentication schemes
=
|
3 years ago |
Kévin Chalet
|
9deb68d433
|
Add an automatic claims mapping feature to the OpenIddict client stack
|
3 years ago |
Kévin Chalet
|
7d1c704848
|
Add a built-in authentication scheme forwarding feature to the OpenIddict client OWIN and ASP.NET Core hosts
|
3 years ago |
Kévin Chalet
|
a4f46da74c
|
Remove the HttpContext.SignInAsync() workaround from the client samples
|
3 years ago |
Kévin Chalet
|
65f3eff30f
|
Update the samples to demonstrate how to override the claims resolved from authorization codes/refresh tokens
|
3 years ago |
Kévin Chalet
|
0d92faa308
|
Add a new OpenIddictAuthorizationManager.CreateAsync() overload and improve OpenIddictScopeManager.ListResourcesAsync()
|
3 years ago |
Kévin Chalet
|
43e75cd49f
|
Update the ProcessChallenge/SignIn/SignOut events to expose the host authentication properties
|
3 years ago |
Kévin Chalet
|
8342dd20ce
|
Support resolving client registrations based on the provider name
|
3 years ago |
Kévin Chalet
|
a99a6cdace
|
Implement RP-initiated logout in the client stack
|
4 years ago |
Kévin Chalet
|
301e9a1c8c
|
Update the samples to use explicit [IgnoreAntiforgeryToken] attributes on relevant actions
|
4 years ago |
Kévin Chalet
|
3bceb9ff58
|
Update the samples to use the ClaimsIdentity constructor taking the name and role claim types
|
4 years ago |
Kévin Chalet
|
1b9081778d
|
Update the samples to stop using SignInManager.CreateUserPrincipalAsync() and use the Microsoft claims for cookie authentication
|
4 years ago |
Kévin Chalet
|
ddc5c9a69c
|
Revamp the claims extensions and update the client and server hosts to preserve the authentication properties using a special private claim
|
4 years ago |
Kévin Chalet
|
fcf3f92fe2
|
Use the OpenIddict client in the server samples and enable GitHub login via Identity
|
4 years ago |
Kévin Chalet
|
3bf51e1600
|
Introduce the first bits of the OpenIddict client
|
6 years ago |