You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
using [claims transformation](https://docs.microsoft.com/en-us/dotnet/API/microsoft.aspnetcore.authentication.iclaimstransformation?view=aspnetcore-7.0).
68
68
For example, if you add a [claim](/identityserver/fundamentals/claims.md) to
69
-
the [userinfo endpoint](/identityserver/reference/endpoints/userinfo.md) at IdentityServer that you would like to include
69
+
the [userinfo endpoint](/identityserver/reference/v8/endpoints/userinfo.md) at IdentityServer that you would like to include
70
70
in the */bff/user* endpoint, you need to add a corresponding ClaimAction in the BFF's OpenID Connect Handler to include
Copy file name to clipboardExpand all lines: astro/src/content/docs/identityserver/apis/aspnetcore/authorization.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ app.MapGet("/", () =>
71
71
72
72
Historically, Duende IdentityServer emitted the `scope` claims as an array in the JWT. This works very well with the .NET deserialization logic, which turns every array item into a separate claim of type `scope`.
73
73
74
-
The newer *JWT Profile for OAuth*[spec](/identityserver/overview/specs.md) mandates that the scope claim is a single space delimited string. You can switch the format by setting the `EmitScopesAsSpaceDelimitedStringInJwt` on the [options](/identityserver/reference/options.md). But this means that the code consuming access tokens might need to be adjusted. The following code can do a conversion to the *multiple claims* format that .NET prefers:
74
+
The newer *JWT Profile for OAuth*[spec](/identityserver/overview/specs.md) mandates that the scope claim is a single space delimited string. You can switch the format by setting the `EmitScopesAsSpaceDelimitedStringInJwt` on the [options](/identityserver/reference/v8/options.md). But this means that the code consuming access tokens might need to be adjusted. The following code can do a conversion to the *multiple claims* format that .NET prefers:
Copy file name to clipboardExpand all lines: astro/src/content/docs/identityserver/configuration/dcr.mdx
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,7 +109,7 @@ create a new ASP.NET Core Web application which will host the Configuration API.
109
109
needs an implementation of this interface.
110
110
111
111
You can either use the Entity Framework Core-based implementation, or implement
112
-
the interface yourself. See [the IClientConfigurationStore reference](/identityserver/reference/stores/index.md)
112
+
the interface yourself. See [the IClientConfigurationStore reference](/identityserver/reference/v8/stores/index.md)
113
113
for more details. If you wish to use the built-in implementation, install its NuGet
114
114
package and add it to the ASP.NET Core service provider.
115
115
@@ -163,7 +163,7 @@ and configure the store implementation.
163
163
needs an implementation of this interface.
164
164
165
165
You can either use the Entity Framework Core-based implementation, or implement
166
-
the interface yourself. See [the IClientConfigurationStore reference](/identityserver/reference/stores/index.md)
166
+
the interface yourself. See [the IClientConfigurationStore reference](/identityserver/reference/v8/stores/index.md)
167
167
for more details. If you wish to use the built-in implementation, install its NuGet
168
168
package and add it to the ASP.NET Core service provider.
169
169
@@ -192,7 +192,7 @@ and configure the store implementation.
192
192
193
193
### Adding the Registration Endpoint to the Discovery Document
194
194
195
-
By default, the Dynamic Client Registration (DCR) endpoint is not included in the [discovery document](/identityserver/reference/endpoints/discovery.md) of Duende IdentityServer.
195
+
By default, the Dynamic Client Registration (DCR) endpoint is not included in the [discovery document](/identityserver/reference/v8/endpoints/discovery.md) of Duende IdentityServer.
196
196
197
197
To include it, change the Discovery Document options when registering IdentityServer in the service collection:
198
198
@@ -263,7 +263,7 @@ authentication scheme and an authorization policy that requires a particular
263
263
scope to be present in the JWTs. You could choose any name for the scope that
264
264
gives access to the Configuration APIs. Let's use the name
265
265
`IdentityServer.Configuration` for this example. You would then define the
266
-
`IdentityServer.Configuration` scope as an [ApiScope](/identityserver/reference/models/api-scope.md) in your
266
+
`IdentityServer.Configuration` scope as an [ApiScope](/identityserver/reference/v8/models/api-scope.md) in your
267
267
IdentityServer and allow the appropriate clients to access it.
268
268
269
269
An automated process running in a CI pipeline could be configured as an OAuth client
@@ -301,7 +301,7 @@ The registration endpoint is invoked by making an HTTP POST request to the `/con
301
301
with a JSON payload containing metadata describing the desired client as described in [RFC 7591](https://datatracker.ietf.org/doc/rfc7591/)
302
302
and [OpenID Connect Dynamic Client Registration 1.0](https://openid.net/specs/openid-connect-registration-1_0.html).
303
303
304
-
The supported metadata properties are listed in the reference section on the [`DynamicClientRegistrationRequest` model](/identityserver/reference/dcr/models.md#dynamicclientregistrationrequest).
304
+
The supported metadata properties are listed in the reference section on the [`DynamicClientRegistrationRequest` model](/identityserver/reference/v8/dcr/models.md#dynamicclientregistrationrequest).
305
305
A mixture of standardized and IdentityServer-specific properties are supported. Most standardized properties that
306
306
are applicable to the client credentials or code flow grants are supported.
307
307
@@ -346,19 +346,19 @@ the original request, the claims principal that made the request, and a dictiona
346
346
pass state between customized steps. Each step should update the client in the context and return an `IStepResult` to
347
347
indicate success or failure.
348
348
349
-
For more details, see the [reference section on DCR validation](/identityserver/reference/dcr/validation.md).
349
+
For more details, see the [reference section on DCR validation](/identityserver/reference/v8/dcr/validation.md).
350
350
351
351
### Processing
352
352
353
353
The request processor can be customized by implementing the `IDynamicClientRegistrationRequestProcessor` interface,
354
354
or by extending the default `DynamicClientRegistrationRequestProcessor`. The default request processor contains virtual
355
355
methods that allow you to override (part of) its functionality.
356
356
357
-
For more details, see the [reference section on DCR request processing](/identityserver/reference/dcr/processing.md).
357
+
For more details, see the [reference section on DCR request processing](/identityserver/reference/v8/dcr/processing.md).
358
358
359
359
### Response Generation
360
360
361
361
To customize the HTTP responses of the Configuration API, you can implement the `IDynamicClientRegistrationResponseGenerator`
362
362
interface, or extend the default `DynamicClientRegistrationResponseGenerator`.
363
363
364
-
For more details, see the [reference section on DCR response generation](/identityserver/reference/dcr/response.md).
364
+
For more details, see the [reference section on DCR response generation](/identityserver/reference/v8/dcr/response.md).
Duende IdentityServer provides [convenience methods](/identityserver/reference/v8/di#caching-configuration-data) to
56
+
enable caching data from the various stores.
57
+
The caching implementation is built on Microsoft's [`HybridCache`](https://learn.microsoft.com/en-us/aspnet/core/performance/caching/hybrid) from the `Microsoft.Extensions.Caching.Hybrid` package, registered as a [keyed service](https://learn.microsoft.com/en-us/dotnet/core/extensions/dependency-injection#keyed-services) under `ServiceProviderKeys.ConfigurationStoreCache`. For example:
* The caching stores use a keyed `HybridCache` instance registered under `ServiceProviderKeys.ConfigurationStoreCache`. You can customize the `HybridCache` behavior by configuring the keyed service registration (e.g., adding a distributed cache backend via `IDistributedCache`).
103
+
* By default, only the L1 (in-memory) cache tier is used. To enable L2 (distributed) caching, register an `IDistributedCache` implementation (e.g., Redis via `AddStackExchangeRedisCache`). `HybridCache` will automatically use it as the L2 tier.
104
+
105
+
</TabItem>
106
+
<TabItemlabel="v7.0">
107
+
108
+
Duende IdentityServer provides [convenience methods](/identityserver/reference/v8/di.md#caching-configuration-data) to
51
109
enable caching data from the various stores.
52
110
The caching implementation relies upon an `ICache<T>` service and must also be added to the ASP.NET Core service provider.
Copy file name to clipboardExpand all lines: astro/src/content/docs/identityserver/data/ef.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,7 +142,7 @@ This options class contains properties to control the operational store and `Per
142
142
143
143
144
144
:::note
145
-
The token cleanup feature does `not` remove persisted grants that are `consumed` (see [persisted grants](/identityserver/reference/stores/persisted-grant-store.md)). It only removes persisted grants that are beyond their `Expiration`.
145
+
The token cleanup feature does `not` remove persisted grants that are `consumed` (see [persisted grants](/identityserver/reference/v8/stores/persisted-grant-store.md)). It only removes persisted grants that are beyond their `Expiration`.
146
146
:::
147
147
148
148
## Database Creation And Schema Changes Across Different IdentityServer Versions
0 commit comments