67 Commits (ff752efe09b319ee930dd181a77edd34a69a0f48)

Author SHA1 Message Date
Kévin Chalet 878569cd3f Update the ASP.NET Core/OWIN hosts to support returning authentication properties for errored requests 1 year ago
Kévin Chalet f5721d0c2c Rename the GetPrompts() and HasPrompt() extensions 1 year ago
Kévin Chalet 74181aa1f5 Bump BouncyCastle, Quartz, Scriban and Wilson 1 year ago
Kévin Chalet e1f729ba0b Validate prompt values specified in authorization requests and update the configuration endpoint to return "prompt_values_supported" 2 years ago
Kévin Chalet ef2e02ee23 Introduce a new .NET 9.0 TFM and use the new X509CertificateLoader API 2 years ago
Kévin Chalet d4c05e2e23 Rename the device, cryptography, logout and verification endpoints and the associated events/event handlers 2 years ago
Kévin Chalet aa6733b2df Do not limit the error controller to a specific HTTP method 2 years ago
Kévin Chalet dde65e2ba4 Move the AddAssemblyAliasToReactiveAsync target to Directory.Build.targets 2 years ago
Kévin Chalet 362a52fd14 Add a MAUI client sample 2 years ago
Kévin Chalet 4f1566665a Allow specifying an explicit code challenge method/grant type/response type/response mode per challenge when using OpenIddictClientService or the ASP.NET Core/OWIN integrations 2 years ago
Kévin Chalet 34db799846 Update AuthenticationController.cs to include a warning indicating that ASP.NET Core Identity doesn't preserve external claims by default 2 years ago
Kévin Chalet 6e836c4bb9 Update the ASP.NET Core samples to use Kestrel as the default HTTP server 2 years ago
Kévin Chalet b32eb8c0a2 Make user codes fully configurable and remove token length assumptions 2 years ago
Kévin Chalet 3bc72160a4 Consider user codes invalid when no client_id claim could be resolved from the AuthenticateResult 2 years ago
Kévin Chalet 3503ecd327 Update the console sandbox to support token refreshing/introspection/revocation with the resource owner password credentials grant 2 years ago
Kévin Chalet 6bb44132b3 Update the system integration package to support interactive logout 2 years ago
Kévin Chalet 491cf85d16 Add DocuSign to the list of supported providers 2 years ago
Kévin Chalet a5d2d867ba Use List<T> instead of Enumerable.Any() in the samples 2 years ago
Kévin Chalet 061e686be2 Remove the partial Startup class from the OpenIddict.Sandbox.AspNet.Server sample 2 years ago
Kévin Chalet 4f09c587ab Update the client stack to support standard token revocation 2 years ago
Kévin Chalet 372eceab62 Add introspection support in the client stack 2 years ago
Kévin Chalet e896a0f8d4 Update the ASP.NET Core samples to target .NET Framework 4.8 2 years ago
Kévin Chalet e9eff303ef Update MapStandardWebServicesFederationClaims to fall back to "name" when no "preferred_username" claim was found 2 years ago
Kévin Chalet 570c7c3123 Update the AuthorizationController samples to validate the identity provider dynamically 2 years ago
Kévin Chalet 6636784754 Add a .NET 8.0 TFM 2 years ago
Kévin Chalet d6c9c0b35c Add client assertions support to the server stack 3 years ago
Kévin Chalet 1c382d90ba Introduce application settings and support configuring token lifetimes per client 3 years ago
Kévin Chalet 4af3f8dc6f Introduce support for application types 3 years ago
Kévin Chalet 8f9c641dd6 Update the samples to store the provider name in the authentication cookie 3 years ago
Kévin Chalet 3f9f16452f Update the ASP.NET Core samples to use automatic authentication schemes 3 years ago
Kévin Chalet 9deb68d433 Add an automatic claims mapping feature to the OpenIddict client stack 3 years ago
Kévin Chalet 7d1c704848 Add a built-in authentication scheme forwarding feature to the OpenIddict client OWIN and ASP.NET Core hosts 3 years ago
Kévin Chalet fb78fb9d0d Remove the Add[Provider]() overload returning a derived builder 3 years ago
Kévin Chalet 64ade94294 Support multiple registrations with the same issuer/provider name and introduce client record models 3 years ago
Kévin Chalet 4685332df5 Add device authorization grant support in the OpenIddict client 3 years ago
Alexander Trauzzi 30c5db26f2
Replace Microsoft SQL Server by SQLite in the sandbox projects 3 years ago
Kévin Chalet ce1d49b3a6 Update the embedded web server to listen on 127.0.0.1/::1 when possible and use http://localhost/ as the default client URI 3 years ago
Kévin Chalet 9b5075e656 Replace the client Windows integration by a cross-platform package and add HttpListener and WebAuthenticationBroker support 3 years ago
Kévin Chalet 532a5941ec Introduce Windows support for the client stack 3 years ago
Kévin Chalet 6ed9eb25e1 Infer the redirection/post-logout redirection endpoint URIs from the redirect_uri/post_logout_redirect_uri configured in client registrations 3 years ago
Kévin Chalet 8c14d4e3e9 Replace references to "URL" by "URI" when resource identifiers are not required to be resource locators 3 years ago
Kévin Chalet 2a987bcebe Support relative redirect_uri/post_logout_redirect_uri in the client stack and revisit how OpenIddict handles URIs 3 years ago
Kévin Chalet 73e6efe4ac Introduce a new DisableTransportSecurityRequirement() option in the OpenIddict client ASP.NET Core and OWIN hosts 3 years ago
Kévin Chalet a4f46da74c Remove the HttpContext.SignInAsync() workaround from the client samples 3 years ago
Kévin Chalet d7582544b8 Introduce Allow*Flow() methods in the client stack to control what grant types/response types/response modes/code challenge methods are enabled 3 years ago
Kévin Chalet 06afece93a Fix the user code generation logic 3 years ago
Kévin Chalet 65f3eff30f Update the samples to demonstrate how to override the claims resolved from authorization codes/refresh tokens 3 years ago
Kévin Chalet 0d92faa308 Add a new OpenIddictAuthorizationManager.CreateAsync() overload and improve OpenIddictScopeManager.ListResourcesAsync() 3 years ago
Kévin Chalet 75b17c94f6 Start testing OpenIddict on .NET 7.0 3 years ago
Kévin Chalet 43e75cd49f Update the ProcessChallenge/SignIn/SignOut events to expose the host authentication properties 4 years ago