You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: make grant_types optional in OpenIdConnectApplicationSettingsClient
The Okta API does not always return grant_types in OIDC app responses,
but the OpenAPI spec marks it as required, causing UnmarshalJSON to fail
with "no value given for required property grant_types".
Applies the same fix pattern introduced in okta#559 (buttonField,
allowMultipleAcsEndpoints) to a field that PR did not cover.
Verified against a real Okta org: zero unmarshal errors across all apps
after this change.
// <x-lifecycle-container><x-lifecycle class=\"ea\"></x-lifecycle></x-lifecycle-container>JWE alg algorithm for encrypting the ID token issued to this client. If this is requested, the response is signed, and then encrypted with the result being a nested JWT. The default, if omitted, is that no encryption is performed. See the [Application Public Keys API](/openapi/okta-management/management/tag/ApplicationSSOPublicKeys/) for more information on encryption keys. See [Key management](https://developer.okta.com/docs/guides/key-management/main/) for more information on how encryption keys are used.
0 commit comments