Skip to content

Commit 80b730d

Browse files
authored
Merge pull request #5716 from piraveena/cli
Add device code doc for Asgardeo
2 parents 1556452 + 399d020 commit 80b730d

File tree

2 files changed

+5
-8
lines changed

2 files changed

+5
-8
lines changed
175 KB
Loading

en/includes/references/grant-types.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,7 @@ Grant types in OAuth 2.0 are defined as the methods used by a client to obtain a
99
- [Client credentials grant](#client-credentials-grant)
1010
- [Implicit grant](#implicit-grant)
1111
- [Password grant](#password-grant)
12-
{% if product_name == "WSO2 Identity Server" %}
1312
- [Device authorization grant](#device-authorization-grant)
14-
{% endif %}
1513
- [Token exchange grant](#token-exchange-grant)
1614
{% if product_name == "WSO2 Identity Server" %}
1715
- [JWT Bearer Grant](#jwt-bearer-grant)
@@ -301,12 +299,13 @@ The following diagram shows how the password grant flow works.
301299
6. The client application can now request user information from the resource server by providing the access token.
302300
7. The resource server returns the requested user information to the client application.
303301

302+
{% if product_name == "WSO2 Identity Server" %}
304303
{{password_grant_show_auth_failure_reason_note}}
304+
{% endif %}
305305

306-
{% if product_name == "WSO2 Identity Server" %}
307306
## Device authorization grant
308307

309-
Device authorization grant (Device flow) is an OAuth 2.0 extension that lets clients sign in to applications through input-constrained devices and devices without a browser.
308+
[Device authorization grant](https://datatracker.ietf.org/doc/html/rfc8628) (Device flow) is an OAuth 2.0 extension that lets clients sign in to applications through input-constrained devices and devices without a browser.
310309
Such devices include smart TVs, printers, and gaming consoles. The device flow does not require two-way communication between the OAuth client and the device. Instead, it guides the end user to another device, such as a smartphone, to complete the sign-in process.
311310

312311
The diagram below illustrates the device flow.
@@ -347,9 +346,9 @@ The diagram below illustrates the device flow.
347346

348347
3. The client device instructs the user to access the provided URI using a secondary device (e.g., a mobile device). The client device provides the user with the user code.
349348

350-
4. WSO2 Identity server prompts the user to enter the end-user code and the user enters the user code.
349+
4. {{ product_name }} prompts the user to enter the end-user code and the user enters the user code.
351350

352-
5. WSO2 Identity server validates the code and asks the end user to accept or decline the authorization request.
351+
5. {{ product_name }} validates the code and asks the end user to accept or decline the authorization request.
353352

354353
6. While the end user reviews the authorization request, the client polls the authorization server with the device code and client identifier to check if the user has completed the authorization step.
355354

@@ -388,8 +387,6 @@ The diagram below illustrates the device flow.
388387

389388
9. The resource server returns the requested user information to the client application.
390389

391-
{% endif %}
392-
393390
## Token exchange grant
394391

395392
OAuth 2.0 token exchange is a grant type in the OAuth 2.0 framework that enables the exchange of one type of token for another with a different set of permissions or attributes. This grant type is defined in the [OAuth Token Exchange specification (RFC 8693)](https://datatracker.ietf.org/doc/html/rfc8693){:target="_blank"}

0 commit comments

Comments
 (0)