Commit graph

98 commits

Author SHA1 Message Date
Juan Ignacio Fiorentino 4d0c12286a Bump version v0.7.0. 2018-10-17 19:09:56 -03:00
Juan Ignacio Fiorentino b875ba5025
Update changelog.rst 2018-10-15 21:20:24 -03:00
Christian Bouvier 12402a268f Fixed title underline too short 2018-10-15 09:05:33 -03:00
Christian Bouvier f743e23cc4 Token Introspection docs (#257)
Added a new doc page related to Token Introspection Endpoint.
The documentation includes some introduction with links to the related RFCs and examples.
2018-10-14 14:24:48 -03:00
Juan Ignacio Fiorentino 02a17e10d5
Update changelog.rst 2018-10-05 12:50:10 -03:00
Juan Ignacio Fiorentino cf0c57ceea
Update changelog.rst 2018-10-05 12:48:43 -03:00
Juan Ignacio Fiorentino 035e7a3674
Update changelog.rst 2018-10-03 16:23:25 -03:00
Juan Ignacio Fiorentino 658eb594e9
Update changelog.rst 2018-09-29 13:33:38 -03:00
Andy Clayton 988b728fb2 update docs for multiple response types per client 2018-08-17 09:54:30 -05:00
Andy Clayton 36018d19ae support multiple response types per client
The Dynamic Client Registration spec specifies multiple response_types
and grant_types per client
(https://openid.net/specs/openid-connect-registration-1_0.html#ClientMetadata).
Since grant_types can be inferred from response_types we should be able
to support both without needing to store grant_types.

This also helps with oidc-client-js which expects a client that supports
both "id_token" and "id_token token".
2018-08-16 11:38:46 -05:00
Juan Ignacio Fiorentino b5e055205c Bump version v0.6.2. 2018-08-03 11:50:56 -03:00
Andy Clayton f1ed3328f8 Accept lowercase "bearer" in Authorization header
We ran into a client that blindly takes the value of token_type, which
is lowercase "bearer", and passes that back in the Authorization header.
In an earlier PR #99 there seemed to be some support for this change to
simply accept "bearer" in addition to "Bearer".
2018-08-02 13:42:21 -05:00
Juan Ignacio Fiorentino d2695f76cf
Update changelog.rst 2018-07-31 14:08:08 -03:00
Juan Ignacio Fiorentino 9a081cb05a
Update changelog.rst 2018-07-19 11:23:19 -03:00
Juan Ignacio Fiorentino 59581f50d9
Merge pull request #256 from q3aiml/client-credentials-introspection
support introspection on client credentials tokens
2018-07-19 11:18:35 -03:00
Juan Ignacio Fiorentino e7eaa52e50 Bump version v0.6.1. 2018-07-10 11:16:02 -03:00
Andy Clayton 9d5c2b39fa support introspection on client credentials tokens
The response can simply omit fields that require id_token as the only
required field is "active" according to RFC 7662. I think it would be
nice for introspection of client credentials tokens to be supported by
default without needing to override
OIDC_INTROSPECTION_VALIDATE_AUDIENCE_SCOPE, but this is a start.
2018-07-06 11:41:09 -05:00
Juan Ignacio Fiorentino b087116818
Update changelog.rst 2018-07-05 18:39:43 -03:00
Juan Ignacio Fiorentino 6e442a5f35
Update changelog.rst 2018-07-04 16:27:57 -03:00
Juan Ignacio Fiorentino 50733f8135
Update changelog.rst 2018-07-04 11:38:30 -03:00
Juan Ignacio Fiorentino 72f123c0b5
Update changelog.rst 2018-07-02 14:23:05 -03:00
Tuomas Suutari c95497dbd9 Remove scope param from OIDC_IDTOKEN_PROCESSING_HOOK
There is no need to pass in the scope parameter separately, since the
scope is available via the token parameter already.
2018-05-31 10:23:58 +03:00
Juan Ignacio Fiorentino 122b5c19fd
Update installation.rst 2018-05-28 12:50:03 -03:00
Juan Ignacio Fiorentino acc3cf588b
Update settings.rst 2018-05-28 12:38:53 -03:00
Juan Ignacio Fiorentino ac509f7a82
Update changelog.rst 2018-05-24 12:29:35 -03:00
Tuomas Suutari 7eb31574ee Document the new ID token processing hook parameters 2018-05-24 09:31:07 +03:00
Juan Ignacio Fiorentino 58bd8ec62c
Update changelog.rst 2018-05-15 10:45:05 -03:00
Juan Ignacio Fiorentino 948745d6ff
Update changelog.rst 2018-04-27 10:34:48 -03:00
Juan Ignacio Fiorentino 9a24257305
Update changelog.rst 2018-04-27 10:33:39 -03:00
Juan Ignacio Fiorentino 5a65ac17f9
Replace resource with client in docs. 2018-04-24 11:10:27 -03:00
Maxim Daniline 20a355d9f5 Update settings docs to add extra introspection setting 2018-04-24 10:09:49 +01:00
Maxim Daniline 180aad9a36 Add token introspection endpoint to satisfy https://tools.ietf.org/html/rfc7662 2018-04-23 10:47:01 +01:00
Juan Ignacio Fiorentino 78fbd53452 Drop support for Django 1.7. 2018-04-20 12:29:48 -03:00
Juan Ignacio Fiorentino 61d88014c9 Remove duplicate link in docs. 2018-04-20 11:19:59 -03:00
Juan Ignacio Fiorentino c06bf43f22 Bump version v0.6.0. 2018-04-13 16:48:06 -03:00
Juan Ignacio Fiorentino 9534ff49bb Edit README and contribute doc. 2018-04-10 22:04:24 -03:00
Juan Ignacio Fiorentino 9b7be87dad Edit changelog. 2018-04-10 21:53:29 -03:00
Juan Ignacio Fiorentino 22e9ee8675
Update changelog.rst 2018-04-10 21:51:39 -03:00
Juan Ignacio Fiorentino 56ad376518 Merge branch 'feature/token_retun_claims' of https://github.com/dhrp/django-oidc-provider into dhrp-feature/token_retun_claims 2018-04-10 18:41:38 -03:00
Juan Ignacio Fiorentino 42df40c16d Fix docs. 2018-04-08 18:29:10 -03:00
Juan Ignacio Fiorentino 5dcb62d35c Improve docs. 2018-04-08 18:28:38 -03:00
Juan Ignacio Fiorentino ff3d6ebe1a Move changelog into docs. 2018-04-05 17:27:01 -03:00
Juan Ignacio Fiorentino 2a34a93da7 Fix contribute docs. 2018-03-22 16:52:08 -03:00
Juan Ignacio Fiorentino e66b374803 Merge branch 'v0.5.x' of https://github.com/juanifioren/django-oidc-provider into develop 2018-03-22 12:28:02 -03:00
Juan Ignacio Fiorentino 4f0afe27d3
Update installation.rst 2018-02-19 23:43:26 -03:00
Yannik Gartmann baa53d0c88
Fixed wrong Object in Template
See >> https://github.com/juanifioren/django-oidc-provider/blob/v0.5.x/oidc_provider/views.py#L129
2018-02-19 16:31:30 +01:00
Reinout van Rees bb218dbc56 Sphinx documentation fixes (#219)
* Small wording change + fix in example template code

* Added note about UserConsent not being in the admin

* Mostly spelling corrections and phrasing changes

* Moved template context explation from the settings to the templates page

* Changed wording

* Changed wording
2017-12-14 18:30:46 +01:00
Wojciech Bartosiak 8149f1f9ab Merge pull request #203 from psavoie/develop
Add pep8 compliance and checker
2017-08-23 15:29:49 +02:00
Philippe Savoie 5dcd6a10b0 Add pep8 compliance and checker 2017-08-22 11:53:52 -07:00
Wojciech Bartosiak 7407e2c5b0 Bump version 2017-07-11 07:35:52 +02:00