forked from aurelia-contrib/aurelia-open-id-connect
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathopen-id-connect-configuration.ts.example
More file actions
39 lines (36 loc) · 1.53 KB
/
open-id-connect-configuration.ts.example
File metadata and controls
39 lines (36 loc) · 1.53 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
import { OpenIdConnectConfiguration } from "aurelia-open-id-connect";
import { UserManagerSettings, WebStorageStateStore } from "oidc-client";
const appHost = "http://localhost:9000";
export default {
loginRedirectRoute: "index",
logoutRedirectRoute: "index",
userManagerSettings: {
// The number of seconds in advance of access token expiry
// to raise the access token expiring event.
accessTokenExpiringNotificationTime: 1,
// Either host your own OpenID Provider or select a certified authority
// from the list http://openid.net/certification/
// We are using Azure Active Directory as our authority.
// See http://bit.ly/2wrX5Wg for details.
authority: "https://login.microsoft.com/common",
automaticSilentRenew: false,
// The interval in milliseconds between checking the user's session.
checkSessionInterval: 10000,
// The client or application ID that the authority issues.
client_id: "dc0e8e79-e73c-4ad9-9743-b262320d77d6",
filterProtocolClaims: true,
loadUserInfo: false,
post_logout_redirect_uri: `${appHost}/signout-oidc`,
redirect_uri: `${appHost}/signin-oidc`,
response_type: "id_token",
scope: "openid",
// number of millisecods to wait for the authorization
// server to response to silent renew request
silentRequestTimeout: 10000,
silent_redirect_uri: `${appHost}/signin-oidc`,
userStore: new WebStorageStateStore({
prefix: "oidc",
store: window.localStorage,
}),
} as UserManagerSettings,
} as OpenIdConnectConfiguration;