You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**remember**|**Boolean**| Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope. |[optional]|
15
14
|**rememberFor**|**Long**| RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely. |[optional]|
|**acr**|**String**| ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using twofactor authentication. |[optional]|
10
+
|**acr**|**String**| ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two-factor authentication. |[optional]|
11
11
|**amr**|**List<String>**||[optional]|
12
12
|**context**|**Object**||[optional]|
13
13
|**extendSessionLifespan**|**Boolean**| Extend OAuth2 authentication session lifespan If set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously. This value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`. |[optional]|
14
14
|**forceSubjectIdentifier** | **String** | ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail. | [optional] |
15
15
|**identityProviderSessionId**|**String**| IdentityProviderSessionID is the session ID of the end-user that authenticated. If specified, we will use this value to propagate the logout. |[optional]|
16
-
|**remember**|**Boolean**| Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again. |[optional]|
16
+
|**remember**|**Boolean**| Remember, if set to true, tells Ory Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, they will not be asked to log in again. |[optional]|
17
17
|**rememberFor**|**Long**| RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the authorization will be remembered for the duration of the browser session (using a session cookie). |[optional]|
18
18
|**subject**|**String**| Subject is the user ID of the end-user that authenticated. ||
Copy file name to clipboardExpand all lines: docs/NormalizedProjectRevisionThirdPartyProvider.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@
24
24
|**mapperUrl**|**String**| Mapper specifies the JSONNet code snippet which uses the OpenID Connect Provider's data (e.g. GitHub or Google profile information) to hydrate the identity's data. |[optional]|
|**pkce**|[**PkceEnum**](#PkceEnum)|PKCE controls if the OpenID Connect OAuth2 flow should use PKCE (Proof Key for Code Exchange). Possible values are: `auto` (default), `never`, `force`. `auto`: PKCE is used if the provider supports it. Requires setting `issuer_url`. `never`: Disable PKCE entirely for this provider, even if the provider advertises support for it. `force`: Always use PKCE, even if the provider does not advertise support for it. OAuth2 flows will fail if the provider does not support PKCE. IMPORTANT: If you set this to `force`, you must whitelist a different return URL for your OAuth2 client in the provider's configuration. Instead of <base-url>/self-service/methods/oidc/callback/<provider>, you must use <base-url>/self-service/methods/oidc/callback (Note the missing <provider> path segment and no trailing slash).|[optional]|
27
+
|**pkce**|[**PkceEnum**](#PkceEnum)||[optional]|
28
28
|**projectRevisionId**|**String**| The Revision's ID this schema belongs to |[optional]|
29
29
|**provider**|**String**| Provider is either \"generic\" for a generic OAuth 2.0 / OpenID Connect Provider or one of: generic google github gitlab microsoft discord slack facebook vk yandex apple |[optional]|
30
30
|**providerId**|**String**| ID is the provider's ID |[optional]|
Copy file name to clipboardExpand all lines: docs/OAuth2Api.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1283,7 +1283,7 @@ No authorization required
1283
1283
1284
1284
The OAuth 2.0 Device Authorize Endpoint
1285
1285
1286
-
This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exists. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
1286
+
This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exist. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
1287
1287
1288
1288
### Example
1289
1289
```java
@@ -1494,7 +1494,7 @@ public class Example {
1494
1494
1495
1495
OAuth 2.0 Device Verification Endpoint
1496
1496
1497
-
This is the device user verification endpoint. The user is redirected here when trying to login using the device flow.
1497
+
This is the device user verification endpoint. The user is redirected here when trying to log in using the device flow.
0 commit comments