Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add access toke attributes docs #4718

Merged
merged 3 commits into from
Nov 13, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view

This file was deleted.

17 changes: 1 addition & 16 deletions en/identity-server/7.0.0/docs/guides/authorization/index.md
Original file line number Diff line number Diff line change
@@ -1,16 +1 @@
# Authorization

The authorization guide offers detailed instructions for implementing a range of authorization scenarios within your application using {{ product_name }}, ensuring secure access and enhanced protection.

## API authorization

- [Role-based access control (RBAC)]({{base_path}}/guides/authorization/api-authorization/api-authorization/)
- [Attribute-based access control (ABAC)]({{base_path}}/guides/authorization/api-authorization/attribute-based-access-control/)

## Fine-grained authorization

- [Fine-grained authorization]({{base_path}}/guides/authorization/fine-grained-authorization/rule-based-provisioning/)

## Impersonation

- [Impersonation]({{base_path}}/guides/authorization/impersonation/user-impersonation/)
{% include "../../../../../includes/guides/authorization/index.md" %}
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
{% set base_url = "localhost:9443" %}
{% set base_url_sample = "localhost:9443" %}

{% include "../../../../../includes/guides/authorization/user-impersonation.md" %}
4 changes: 2 additions & 2 deletions en/identity-server/7.0.0/mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -332,6 +332,7 @@ plugins:

# To address the broken links in the API Authorization guides due to the directory structure mismatch is Asgardeo and IS
'guides/api-authorization.md': 'guides/authorization/api-authorization/api-authorization.md'
'guides/authorization/impersonation/user-impersonation.md': 'guides/authorization/user-impersonation.md'

# Navigation
nav:
Expand Down Expand Up @@ -480,8 +481,7 @@ nav:
- Attribute-based access control: guides/authorization/api-authorization/attribute-based-access-control.md
- Fine-grained authorization:
- XACML in provisioning flows: guides/authorization/fine-grained-authorization/rule-based-provisioning.md
- Impersonation:
- User Impersonation: guides/authorization/impersonation/user-impersonation.md
- User Impersonation: guides/authorization/user-impersonation.md
- Branding:
- Branding: guides/branding/index.md
- Configure UI branding: guides/branding/configure-ui-branding.md
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

This file was deleted.

17 changes: 1 addition & 16 deletions en/identity-server/next/docs/guides/authorization/index.md
Original file line number Diff line number Diff line change
@@ -1,16 +1 @@
# Authorization

The authorization guide offers detailed instructions for implementing a range of authorization scenarios within your application using {{ product_name }}, ensuring secure access and enhanced protection.

## API authorization

- [Role-based access control (RBAC)]({{base_path}}/guides/authorization/api-authorization/api-authorization/)
- [Attribute-based access control (ABAC)]({{base_path}}/guides/authorization/api-authorization/attribute-based-access-control/)

## Fine-grained authorization

- [Fine-grained authorization]({{base_path}}/guides/authorization/fine-grained-authorization/rule-based-provisioning/)

## Impersonation

- [Impersonation]({{base_path}}/guides/authorization/impersonation/user-impersonation/)
{% include "../../../../../includes/guides/authorization/index.md" %}
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
{% set base_url = "localhost:9443" %}
{% set base_url_sample = "localhost:9443" %}

{% include "../../../../../includes/guides/authorization/user-impersonation.md" %}
4 changes: 2 additions & 2 deletions en/identity-server/next/mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -329,6 +329,7 @@ plugins:

# To address the broken links in the API Authorization guides due to the directory structure mismatch is Asgardeo and IS
'guides/api-authorization.md': 'guides/authorization/api-authorization/api-authorization.md'
'guides/authorization/impersonation/user-impersonation.md': 'guides/authorization/user-impersonation.md'

# Navigation
nav:
Expand Down Expand Up @@ -478,8 +479,7 @@ nav:
- Attribute-based access control: guides/authorization/api-authorization/attribute-based-access-control.md
- Fine-grained authorization:
- XACML in provisioning flows: guides/authorization/fine-grained-authorization/rule-based-provisioning.md
- Impersonation:
- User Impersonation: guides/authorization/impersonation/user-impersonation.md
- User Impersonation: guides/authorization/user-impersonation.md
- Identity Verification:
- Identity Verification: guides/identity-verification/index.md
- Configure an Identity Verification Provider: guides/identity-verification/configure-identity-verification-provider.md
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
#### Token type
{{product_name}} supports the following token types.

- *Opaque*: Opaque tokens are plain text tokens. If a resource server wants to know information related to an opaque token, it has to call the introspection endpoint and receive information related to tokens. An example for a opaque token response is shown below.
- **Opaque**: Opaque tokens are plain text tokens. If a resource server wants to know information related to an opaque token, it has to call the introspection endpoint and receive information related to tokens. An example for a opaque token response is shown below.

```json
{
Expand All @@ -14,7 +14,7 @@
}
```

- *JWT token*: JWT tokens are self-contained verifiable access tokens. If a resource server wants to know the information related to that token, it can decode the token and get the required information without any additional network calls. An example for a JWT token response is shown below.
- **JWT**: JWT tokens are self-contained verifiable access tokens. If a resource server wants to know the information related to that token, it can decode the token and get the required information without any additional network calls. An example for a JWT token response is shown below.

```json
{
Expand All @@ -27,6 +27,15 @@
```
<br>

{% if product_name == "WSO2 Identity Server" and is_version != "7.0.0" %}
#### Access Token Attributes

For **JWT** access tokens, this feature enables you to specify which user attributes are included in the access token. As a result, when a user logs in to an application, only the chosen attributes are shared, providing enhanced security and flexibility.

![Access-Token-Attributes]({{base_path}}/assets/img/guides/authorization/access-token/access-token-attributes.png){: width="600" style="display: block; margin: 0; border: 0.3px solid lightgrey;"}

{% endif %}

#### Token binding type

Token binding securely links authentication tokens to client devices to prevent unauthorized token theft and replay attacks. It is a vital mechanism, especially when dealing with unsecured networks, as it provides an additional layer of security against unauthorized access.
Expand Down