Kévin Chalet
|
d4c05e2e23
|
Rename the device, cryptography, logout and verification endpoints and the associated events/event handlers
|
1 year ago |
Kévin Chalet
|
aa6733b2df
|
Do not limit the error controller to a specific HTTP method
|
1 year ago |
Kévin Chalet
|
34db799846
|
Update AuthenticationController.cs to include a warning indicating that ASP.NET Core Identity doesn't preserve external claims by default
|
2 years ago |
Kévin Chalet
|
b32eb8c0a2
|
Make user codes fully configurable and remove token length assumptions
|
2 years ago |
Kévin Chalet
|
3bc72160a4
|
Consider user codes invalid when no client_id claim could be resolved from the AuthenticateResult
|
2 years ago |
Kévin Chalet
|
a5d2d867ba
|
Use List<T> instead of Enumerable.Any() in the samples
|
2 years ago |
Kévin Chalet
|
061e686be2
|
Remove the partial Startup class from the OpenIddict.Sandbox.AspNet.Server sample
|
2 years ago |
Kévin Chalet
|
e896a0f8d4
|
Update the ASP.NET Core samples to target .NET Framework 4.8
|
2 years ago |
Kévin Chalet
|
e9eff303ef
|
Update MapStandardWebServicesFederationClaims to fall back to "name" when no "preferred_username" claim was found
|
2 years ago |
Kévin Chalet
|
570c7c3123
|
Update the AuthorizationController samples to validate the identity provider dynamically
|
2 years ago |
Kévin Chalet
|
8f9c641dd6
|
Update the samples to store the provider name in the authentication cookie
|
2 years ago |
Kévin Chalet
|
3f9f16452f
|
Update the ASP.NET Core samples to use automatic authentication schemes
=
|
3 years ago |
Kévin Chalet
|
9deb68d433
|
Add an automatic claims mapping feature to the OpenIddict client stack
|
3 years ago |
Kévin Chalet
|
7d1c704848
|
Add a built-in authentication scheme forwarding feature to the OpenIddict client OWIN and ASP.NET Core hosts
|
3 years ago |
Kévin Chalet
|
a4f46da74c
|
Remove the HttpContext.SignInAsync() workaround from the client samples
|
3 years ago |
Kévin Chalet
|
65f3eff30f
|
Update the samples to demonstrate how to override the claims resolved from authorization codes/refresh tokens
|
3 years ago |
Kévin Chalet
|
0d92faa308
|
Add a new OpenIddictAuthorizationManager.CreateAsync() overload and improve OpenIddictScopeManager.ListResourcesAsync()
|
3 years ago |
Kévin Chalet
|
43e75cd49f
|
Update the ProcessChallenge/SignIn/SignOut events to expose the host authentication properties
|
3 years ago |
Kévin Chalet
|
8342dd20ce
|
Support resolving client registrations based on the provider name
|
3 years ago |
Kévin Chalet
|
a99a6cdace
|
Implement RP-initiated logout in the client stack
|
4 years ago |
Kévin Chalet
|
301e9a1c8c
|
Update the samples to use explicit [IgnoreAntiforgeryToken] attributes on relevant actions
|
4 years ago |
Kévin Chalet
|
3bceb9ff58
|
Update the samples to use the ClaimsIdentity constructor taking the name and role claim types
|
4 years ago |
Kévin Chalet
|
1b9081778d
|
Update the samples to stop using SignInManager.CreateUserPrincipalAsync() and use the Microsoft claims for cookie authentication
|
4 years ago |
Kévin Chalet
|
ddc5c9a69c
|
Revamp the claims extensions and update the client and server hosts to preserve the authentication properties using a special private claim
|
4 years ago |
Kévin Chalet
|
fcf3f92fe2
|
Use the OpenIddict client in the server samples and enable GitHub login via Identity
|
4 years ago |
Kévin Chalet
|
3bf51e1600
|
Introduce the first bits of the OpenIddict client
|
6 years ago |