You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -301,12 +299,13 @@ The following diagram shows how the password grant flow works.
301
299
6. The client application can now request user information from the resource server by providing the access token.
302
300
7. The resource server returns the requested user information to the client application.
303
301
302
+
{% if product_name == "WSO2 Identity Server" %}
304
303
{{password_grant_show_auth_failure_reason_note}}
304
+
{% endif %}
305
305
306
-
{% if product_name == "WSO2 Identity Server" %}
307
306
## Device authorization grant
308
307
309
-
Device authorization grant (Device flow) is an OAuth 2.0 extension that lets clients sign in to applications through input-constrained devices and devices without a browser.
308
+
[Device authorization grant](https://datatracker.ietf.org/doc/html/rfc8628) (Device flow) is an OAuth 2.0 extension that lets clients sign in to applications through input-constrained devices and devices without a browser.
310
309
Such devices include smart TVs, printers, and gaming consoles. The device flow does not require two-way communication between the OAuth client and the device. Instead, it guides the end user to another device, such as a smartphone, to complete the sign-in process.
311
310
312
311
The diagram below illustrates the device flow.
@@ -347,9 +346,9 @@ The diagram below illustrates the device flow.
347
346
348
347
3. The client device instructs the user to access the provided URI using a secondary device (e.g., a mobile device). The client device provides the user with the user code.
349
348
350
-
4. WSO2 Identity server prompts the user to enter the end-user code and the user enters the user code.
349
+
4. {{ product_name }} prompts the user to enter the end-user code and the user enters the user code.
351
350
352
-
5. WSO2 Identity server validates the code and asks the end user to accept or decline the authorization request.
351
+
5. {{ product_name }} validates the code and asks the end user to accept or decline the authorization request.
353
352
354
353
6. While the end user reviews the authorization request, the client polls the authorization server with the device code and client identifier to check if the user has completed the authorization step.
355
354
@@ -388,8 +387,6 @@ The diagram below illustrates the device flow.
388
387
389
388
9. The resource server returns the requested user information to the client application.
390
389
391
-
{% endif %}
392
-
393
390
## Token exchange grant
394
391
395
392
OAuth 2.0 token exchange is a grant typein the OAuth 2.0 framework that enables the exchange of one type of token foranother with a different set of permissions or attributes. This grant type is definedin the [OAuth Token Exchange specification (RFC 8693)](https://datatracker.ietf.org/doc/html/rfc8693){:target="_blank"}
0 commit comments