diff --git a/Cargo.toml b/Cargo.toml index 943a7bd..16e13cd 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "openid" -version = "0.14.0" +version = "0.15.0" authors = ["Alexander Korolev "] edition = "2021" categories = ["authentication"] diff --git a/README.md b/README.md index a66d8b9..aa2b943 100644 --- a/README.md +++ b/README.md @@ -42,14 +42,14 @@ Add dependency to Cargo.toml: ```toml [dependencies] -openid = "0.14" +openid = "0.15" ``` By default we use native tls, if you want to use `rustls`: ```toml [dependencies] -openid = { version = "0.14", default-features = false, features = ["rustls"] } +openid = { version = "0.15", default-features = false, features = ["rustls"] } ``` ### Use case: [Warp](https://crates.io/crates/warp) web server with [JHipster](https://www.jhipster.tech/) generated frontend and [Google OpenID Connect](https://developers.google.com/identity/protocols/OpenIDConnect) @@ -64,7 +64,7 @@ anyhow = "1.0" cookie = "0.18" dotenv = "0.15" log = "0.4" -openid = "0.14" +openid = "0.15" pretty_env_logger = "0.5" reqwest = "0.12" serde = { version = "1", default-features = false, features = [ "derive" ] } @@ -377,4 +377,4 @@ pub fn host(path: &str) -> String { } ``` -See full example: [openid-examples: warp](https://github.com/kilork/openid-examples/blob/v0.14/examples/warp.rs) +See full example: [openid-examples: warp](https://github.com/kilork/openid-examples/blob/v0.15/examples/warp.rs) diff --git a/templates/README.md b/templates/README.md index cfff332..96e3f98 100644 --- a/templates/README.md +++ b/templates/README.md @@ -10,6 +10,8 @@ Implements [OpenID Connect Core 1.0](https://openid.net/specs/openid-connect-cor Implements [UMA2](https://docs.kantarainitiative.org/uma/wg/oauth-uma-federated-authz-2.0-09.html) - User Managed Access, an extension to OIDC/OAuth2. Use feature flag `uma2` to enable this feature. +Implements [OAuth 2.0 Token Introspection](https://datatracker.ietf.org/doc/html/rfc7662). + It supports Microsoft OIDC with feature `microsoft`. This adds methods for authentication and token validation, those skip issuer check. Originally developed as a quick adaptation to leverage async/await functionality, based on [inth-oauth2](https://crates.io/crates/inth-oauth2) and [oidc](https://crates.io/crates/oidc), the library has since evolved into a mature and robust solution, offering expanded features and improved performance.