You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**remember** | **bool** | Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope. | [optional]
16
15
**rememberFor** | **int** | RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely. | [optional]
**acr** | **String** | ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using twofactor authentication. | [optional]
11
+
**acr** | **String** | ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two-factor authentication. | [optional]
**extendSessionLifespan** | **bool** | Extend OAuth2 authentication session lifespan If set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously. This value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`. | [optional]
15
15
**forceSubjectIdentifier** | **String** | ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail. | [optional]
16
16
**identityProviderSessionId** | **String** | IdentityProviderSessionID is the session ID of the end-user that authenticated. If specified, we will use this value to propagate the logout. | [optional]
17
-
**remember** | **bool** | Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again. | [optional]
17
+
**remember** | **bool** | Remember, if set to true, tells Ory Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, they will not be asked to log in again. | [optional]
18
18
**rememberFor** | **int** | RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the authorization will be remembered for the duration of the browser session (using a session cookie). | [optional]
19
19
**subject** | **String** | Subject is the user ID of the end-user that authenticated. |
Copy file name to clipboardExpand all lines: doc/NormalizedProjectRevisionThirdPartyProvider.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Name | Type | Description | Notes
25
25
**mapperUrl** | **String** | Mapper specifies the JSONNet code snippet which uses the OpenID Connect Provider's data (e.g. GitHub or Google profile information) to hydrate the identity's data. | [optional]
**pkce** | **String** | PKCE controls if the OpenID Connect OAuth2 flow should use PKCE (Proof Key for Code Exchange). Possible values are: `auto` (default), `never`, `force`. `auto`: PKCE is used if the provider supports it. Requires setting `issuer_url`. `never`: Disable PKCE entirely for this provider, even if the provider advertises support for it. `force`: Always use PKCE, even if the provider does not advertise support for it. OAuth2 flows will fail if the provider does not support PKCE. IMPORTANT: If you set this to `force`, you must whitelist a different return URL for your OAuth2 client in the provider's configuration. Instead of <base-url>/self-service/methods/oidc/callback/<provider>, you must use <base-url>/self-service/methods/oidc/callback (Note the missing <provider> path segment and no trailing slash). | [optional]
28
+
**pkce** | **String** | | [optional]
29
29
**projectRevisionId** | **String** | The Revision's ID this schema belongs to | [optional]
30
30
**provider** | **String** | Provider is either \"generic\" for a generic OAuth 2.0 / OpenID Connect Provider or one of: generic google github gitlab microsoft discord slack facebook vk yandex apple | [optional]
31
31
**providerId** | **String** | ID is the provider's ID | [optional]
Copy file name to clipboardExpand all lines: doc/OAuth2Api.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -838,7 +838,7 @@ No authorization required
838
838
839
839
The OAuth 2.0 Device Authorize Endpoint
840
840
841
-
This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exists. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
841
+
This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exist. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
842
842
843
843
### Example
844
844
```dart
@@ -978,7 +978,7 @@ Name | Type | Description | Notes
978
978
979
979
OAuth 2.0 Device Verification Endpoint
980
980
981
-
This is the device user verification endpoint. The user is redirected here when trying to login using the device flow.
981
+
This is the device user verification endpoint. The user is redirected here when trying to log in using the device flow.
Copy file name to clipboardExpand all lines: lib/src/api/o_auth2_api.dart
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1597,7 +1597,7 @@ class OAuth2Api {
1597
1597
}
1598
1598
1599
1599
/// The OAuth 2.0 Device Authorize Endpoint
1600
-
/// This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exists. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
1600
+
/// This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exist. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
1601
1601
///
1602
1602
/// Parameters:
1603
1603
/// * [cancelToken] - A [CancelToken] that can be used to cancel the operation
@@ -1890,7 +1890,7 @@ class OAuth2Api {
1890
1890
}
1891
1891
1892
1892
/// OAuth 2.0 Device Verification Endpoint
1893
-
/// This is the device user verification endpoint. The user is redirected here when trying to login using the device flow.
1893
+
/// This is the device user verification endpoint. The user is redirected here when trying to log in using the device flow.
1894
1894
///
1895
1895
/// Parameters:
1896
1896
/// * [cancelToken] - A [CancelToken] that can be used to cancel the operation
Copy file name to clipboardExpand all lines: lib/src/model/accept_o_auth2_consent_request.dart
-18Lines changed: 0 additions & 18 deletions
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,6 @@ part 'accept_o_auth2_consent_request.g.dart';
17
17
/// * [context]
18
18
/// * [grantAccessTokenAudience]
19
19
/// * [grantScope]
20
-
/// * [handledAt]
21
20
/// * [remember] - Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope.
22
21
/// * [rememberFor] - RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely.
23
22
/// * [session]
@@ -32,9 +31,6 @@ abstract class AcceptOAuth2ConsentRequest implements Built<AcceptOAuth2ConsentRe
32
31
@BuiltValueField(wireName:r'grant_scope')
33
32
BuiltList<String>?get grantScope;
34
33
35
-
@BuiltValueField(wireName:r'handled_at')
36
-
DateTime?get handledAt;
37
-
38
34
/// Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope.
39
35
@BuiltValueField(wireName:r'remember')
40
36
bool?get remember;
@@ -90,13 +86,6 @@ class _$AcceptOAuth2ConsentRequestSerializer implements PrimitiveSerializer<Acce
Copy file name to clipboardExpand all lines: lib/src/model/accept_o_auth2_login_request.dart
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -13,18 +13,18 @@ part 'accept_o_auth2_login_request.g.dart';
13
13
/// AcceptOAuth2LoginRequest
14
14
///
15
15
/// Properties:
16
-
/// * [acr] - ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using twofactor authentication.
16
+
/// * [acr] - ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two-factor authentication.
17
17
/// * [amr]
18
18
/// * [context]
19
19
/// * [extendSessionLifespan] - Extend OAuth2 authentication session lifespan If set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously. This value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`.
20
20
/// * [forceSubjectIdentifier] - ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.
21
21
/// * [identityProviderSessionId] - IdentityProviderSessionID is the session ID of the end-user that authenticated. If specified, we will use this value to propagate the logout.
22
-
/// * [remember] - Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again.
22
+
/// * [remember] - Remember, if set to true, tells Ory Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, they will not be asked to log in again.
23
23
/// * [rememberFor] - RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the authorization will be remembered for the duration of the browser session (using a session cookie).
24
24
/// * [subject] - Subject is the user ID of the end-user that authenticated.
/// ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using twofactor authentication.
27
+
/// ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two-factor authentication.
28
28
@BuiltValueField(wireName:r'acr')
29
29
String?get acr;
30
30
@@ -46,7 +46,7 @@ abstract class AcceptOAuth2LoginRequest implements Built<AcceptOAuth2LoginReques
/// Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again.
49
+
/// Remember, if set to true, tells Ory Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, they will not be asked to log in again.
0 commit comments