-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Thomas Haines <[email protected]>
- Loading branch information
1 parent
fbf04f3
commit 92c2cdd
Showing
2 changed files
with
45 additions
and
5 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -76,7 +76,7 @@ The ID token claims will then include the following audience and authorized part | |
"email": "[email protected]", | ||
// other claims... | ||
} | ||
``` | ||
``` | ||
## Public clients | ||
|
@@ -88,11 +88,22 @@ staticClients: | |
public: true | ||
name: 'CLI app' | ||
secret: cli-app-secret | ||
redirectURIs: | ||
- 'https://localhost:8080/callback' # sample URL, see below restrictions | ||
``` | ||
|
||
Instead of traditional redirect URIs, public clients are limited to either redirects that begin with "http://localhost" or a special "out-of-browser" URL "urn:ietf:wg:oauth:2.0:oob". The latter triggers dex to display the OAuth2 code in the browser, prompting the end user to manually copy it to their app. It's the client's responsibility to either create a screen or a prompt to receive the code, then perform a code exchange for a token response. | ||
In contract to non-public (confidential) clients, the allowed redirect URIs for public clients are heavily restricted. | ||
The URI must been one of the following conditions: | ||
|
||
a. matches the "out-of-browser" URL `urn:ietf:wg:oauth:2.0:oob` | ||
|
||
b. begins with `http://localhost` or `https://localhost` | ||
|
||
The out-of-browser URL triggers dex to display the OAuth2 code in the browser, prompting the end user to manually copy it to their app. | ||
|
||
It's the client's responsibility to create a screen or prompt to receive the code, then perform a code exchange for a token response. | ||
|
||
When using the "out-of-browser" flow, an ID Token nonce is strongly recommended. | ||
When using the "out-of-browser" flow, we strongly recommended using an ID Token nonce. | ||
|
||
[saml-connector]: saml-connector.md | ||
[core-claims]: https://openid.net/specs/openid-connect-core-1_0.html#IDToken | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters