- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for idToken (0.04 sec)
-
src/main/java/org/codelibs/fess/sso/entraid/EntraIdAuthenticator.java
protected void validateNonce(final StateData stateData, final IAuthenticationResult authData) { final String idToken = authData.idToken(); if (logger.isDebugEnabled()) { logger.debug("idToken={}", idToken); } try { final JWTClaimsSet claimsSet = JWTParser.parse(idToken).getJWTClaimsSet(); if (claimsSet == null) {
Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sat Dec 13 02:21:17 UTC 2025 - 56.7K bytes - Viewed (0) -
docs/sts/wso2.md
1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0) -
docs/sts/web-identity.md
- The redirection URI (callback handler) receives the OAuth2 callback, verifies the state parameter, and obtains a Token. - Using the id_token the callback handler further talks to Google OAuth2 Token URL to obtain an JWT id_token. - Once obtained the JWT id_token is further sent to STS endpoint i.e MinIO to retrieve temporary credentials. - Temporary credentials are displayed on the browser upon successful retrieval.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
docs/sts/web-identity.go
flag.IntVar(&port, "port", 8080, "Port") } func implicitFlowURL(c oauth2.Config, state string) string { var buf bytes.Buffer buf.WriteString(c.Endpoint.AuthURL) v := url.Values{ "response_type": {"id_token"}, "response_mode": {"form_post"}, "client_id": {c.ClientID}, } if c.RedirectURL != "" { v.Set("redirect_uri", c.RedirectURL) } if len(c.Scopes) > 0 {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 19 09:13:33 UTC 2023 - 7.8K bytes - Viewed (0) -
docs/sts/README.md
> > - [**AssumeRole**](https://github.com/minio/minio/blob/master/docs/sts/assume-role.md) > - [**AD/LDAP**](https://github.com/minio/minio/blob/master/docs/sts/ldap.md)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.8K bytes - Viewed (0) -
docs/sts/dex.md
time="2020-07-12T20:45:50Z" level=info msg="config connector: mock" time="2020-07-12T20:45:50Z" level=info msg="config connector: local passwords enabled" time="2020-07-12T20:45:50Z" level=info msg="config response types accepted: [code token id_token]" time="2020-07-12T20:45:50Z" level=info msg="config using password grant connector: local" time="2020-07-12T20:45:50Z" level=info msg="config signing keys expire after: 3h0m0s"
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3.8K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
package provider import ( "encoding/json" "errors" "fmt" "net/http" "net/url" "path" "strings" "sync" ) // Token - parses the output from IDP id_token. type Token struct { AccessToken string `json:"access_token"` Expiry int `json:"expires_in"` } // KeycloakProvider implements Provider interface for KeyCloak Identity Provider.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Jul 14 18:12:07 UTC 2024 - 4.6K bytes - Viewed (0) -
docs/sts/casdoor.md
``` ### Using WebIdentiy API On another terminal run `web-identity.go` a sample client application which obtains JWT id_tokens from an identity provider, in our case its Keycloak. Uses the returned id_token response to get new temporary credentials from the MinIO server using the STS API call `AssumeRoleWithWebIdentity`. ```
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 6.6K bytes - Viewed (0) -
cmd/utils.go
// code, which we now have in `lastReq`. Exchange it for a JWT id_token. q := lastReq.URL.Query() // fmt.Printf("lastReq.URL: %#v q: %#v\n", lastReq.URL, q) code := q.Get("code") oauth2Token, err := oauth2Config.Exchange(ctx, code) if err != nil { return "", fmt.Errorf("unable to exchange code for id token: %v", err) } rawIDToken, ok := oauth2Token.Extra("id_token").(string) if !ok {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 33K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
} claims["exp"] = time.Now().UTC().Add(defaultExpiryDuration).Unix() // update with new expiry. return nil } const ( audClaim = "aud" azpClaim = "azp" ) // Validate - validates the id_token. func (r *Config) Validate(ctx context.Context, arn arn.ARN, token, accessToken, dsecs string, claims map[string]any) error { jp := new(jwtgo.Parser) jp.ValidMethods = []string{ "RS256", "RS384", "RS512",
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 8.4K bytes - Viewed (0)