- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 24 for id_token (0.11 sec)
-
docs/sts/web-identity.md
- The redirection URI (callback handler) receives the OAuth2 callback, verifies the state parameter, and obtains a Token. - Using the id_token the callback handler further talks to Google OAuth2 Token URL to obtain an JWT id_token. - Once obtained the JWT id_token is further sent to STS endpoint i.e MinIO to retrieve temporary credentials. - Temporary credentials are displayed on the browser upon successful retrieval.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 20:16:44 UTC 2024 - 18.9K bytes - Viewed (0) -
docs/sts/web-identity.go
flag.IntVar(&port, "port", 8080, "Port") } func implicitFlowURL(c oauth2.Config, state string) string { var buf bytes.Buffer buf.WriteString(c.Endpoint.AuthURL) v := url.Values{ "response_type": {"id_token"}, "response_mode": {"form_post"}, "client_id": {c.ClientID}, } if c.RedirectURL != "" { v.Set("redirect_uri", c.RedirectURL) } if len(c.Scopes) > 0 {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 19 09:13:33 UTC 2023 - 7.8K bytes - Viewed (0) -
docs/sts/dex.md
time="2020-07-12T20:45:50Z" level=info msg="config connector: mock" time="2020-07-12T20:45:50Z" level=info msg="config connector: local passwords enabled" time="2020-07-12T20:45:50Z" level=info msg="config response types accepted: [code token id_token]" time="2020-07-12T20:45:50Z" level=info msg="config using password grant connector: local" time="2020-07-12T20:45:50Z" level=info msg="config signing keys expire after: 3h0m0s"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Mar 21 06:38:06 UTC 2023 - 3.8K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
package provider import ( "encoding/json" "errors" "fmt" "net/http" "net/url" "path" "strings" "sync" ) // Token - parses the output from IDP id_token. type Token struct { AccessToken string `json:"access_token"` Expiry int `json:"expires_in"` } // KeycloakProvider implements Provider interface for KeyCloak Identity Provider.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Jul 14 18:12:07 UTC 2024 - 4.6K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/sso/aad/AzureAdAuthenticator.java
protected void validateNonce(final StateData stateData, final AuthenticationResult authData) { final String idToken = authData.getIdToken(); if (logger.isDebugEnabled()) { logger.debug("idToken: {}", idToken); } try { final JWTClaimsSet claimsSet = JWTParser.parse(idToken).getJWTClaimsSet(); if (claimsSet == null) {
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Feb 22 01:53:18 UTC 2024 - 28.2K bytes - Viewed (0) -
cmd/utils.go
// code, which we now have in `lastReq`. Exchange it for a JWT id_token. q := lastReq.URL.Query() // fmt.Printf("lastReq.URL: %#v q: %#v\n", lastReq.URL, q) code := q.Get("code") oauth2Token, err := oauth2Config.Exchange(ctx, code) if err != nil { return "", fmt.Errorf("unable to exchange code for id token: %v", err) } rawIDToken, ok := oauth2Token.Extra("id_token").(string) if !ok {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 13 22:22:04 UTC 2024 - 31.9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/sso/oic/OpenIdConnectAuthenticator.java
protected LoginCredential processCallback(final HttpServletRequest request, final String code) { try { final TokenResponse tr = getTokenUrl(code); final String[] jwt = ((String) tr.get("id_token")).split("\\."); final String jwtHeader = new String(decodeBase64(jwt[0]), Constants.UTF_8_CHARSET); final String jwtClaim = new String(decodeBase64(jwt[1]), Constants.UTF_8_CHARSET);
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Fri Oct 11 21:20:39 UTC 2024 - 12.3K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
} claims["exp"] = time.Now().UTC().Add(defaultExpiryDuration).Unix() // update with new expiry. return nil } const ( audClaim = "aud" azpClaim = "azp" ) // Validate - validates the id_token. func (r *Config) Validate(ctx context.Context, arn arn.ARN, token, accessToken, dsecs string, claims map[string]interface{}) error { jp := new(jwtgo.Parser) jp.ValidMethods = []string{ "RS256", "RS384", "RS512",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 02:46:36 UTC 2024 - 8.4K bytes - Viewed (0) -
docs_src/header_params/tutorial003_an_py310.py
from typing import Annotated from fastapi import FastAPI, Header app = FastAPI() @app.get("/items/") async def read_items(x_token: Annotated[list[str] | None, Header()] = None):
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Mar 18 12:29:59 UTC 2023 - 221 bytes - Viewed (0) -
docs_src/app_testing/app_b/main.py
async def read_main(item_id: str, x_token: str = Header()): if x_token != fake_secret_token: raise HTTPException(status_code=400, detail="Invalid X-Token header") if item_id not in fake_db: raise HTTPException(status_code=404, detail="Item not found") return fake_db[item_id] @app.post("/items/", response_model=Item) async def create_item(item: Item, x_token: str = Header()):
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Jan 09 14:44:08 UTC 2024 - 1.1K bytes - Viewed (0)