Kévin Chalet
|
beb6b3e92b
|
Make authorization codes reference tokens by default, split UseReferenceTokens into two settings and allow the Data Protection to fall back to JWT for specific token types
|
6 years ago |
Kévin Chalet
|
fb406560c6
|
Normalize multiple public scope claims to a single spare-separated claim
|
6 years ago |
Kévin Chalet
|
8021c15328
|
Use the generic host builder on .NET Core 3.1
|
6 years ago |
Kévin Chalet
|
77ca35a53f
|
Use private claims for the token creation/expiration dates and introduce new Data Protection authentication properties
|
6 years ago |
Kévin Chalet
|
f81f8fc7dd
|
Introduce introspection support and revamp the events model used by the validation handler
|
6 years ago |
Kévin Chalet
|
be23e18023
|
Leverage IdentityModel's new TypeValidator mechanism to allow validating JWT tokens issued by OpenIddict 1.x/2.x
|
6 years ago |
Kévin Chalet
|
414e05eed4
|
Create a DB entry for all types of tokens, rework reference tokens support and add token entry validation to the validation handler
|
6 years ago |
Kévin Chalet
|
fb92acbdaf
|
Replace OpenIddictApplicationManager.IsConfidentialAsync()/IsPublicAsync()/IsHybridAsync() by HasClientTypeAsync()
|
6 years ago |
Kévin Chalet
|
fd63da76df
|
Allow returning custom challenge/sign-in/sign-out parameters via AuthenticationProperties.Parameters
|
6 years ago |
Kévin Chalet
|
8b097321c3
|
Update the ValidatePrincipal handler to ensure the token type of the claims principal matches the expected type
|
6 years ago |
Kévin Chalet
|
ac5f302b01
|
Add MapInternalClaims and handle multiple public "scope" claims for backward compatibility
|
6 years ago |
Kévin Chalet
|
97dffed124
|
Implement complete WWW-Authenticate response header support
|
6 years ago |
Kévin Chalet
|
a8f9e53f9d
|
Relax the relative URLs constraints and fix the Uri construction logic to correctly compute absolute URLs
|
6 years ago |
Kévin Chalet
|
76a432e045
|
Port the challenge integration tests
|
6 years ago |
Kévin Chalet
|
3cbe3936bd
|
Port the sign-out integration tests and add validation to prevent sign-out from being triggered from unsupported endpoints
|
6 years ago |
Kévin Chalet
|
831a5b988a
|
Port the sign-in integration tests
|
6 years ago |
Kévin Chalet
|
a25907cd52
|
Automatically map the scope/azp access token claims to their OpenIddict private claims equivalents
|
6 years ago |
Kévin Chalet
|
c61f22f589
|
Port the authentication integration tests
|
6 years ago |
Kévin Chalet
|
eb35cbefb7
|
Port the token endpoint integration tests
|
6 years ago |
Kévin Chalet
|
5361c66be1
|
Add integration tests for the authorization endpoint
|
6 years ago |