Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade fosite to latest version #1866

Merged
merged 3 commits into from
Feb 13, 2024
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Correct doc which explained bug that has since been fixed.
  • Loading branch information
cfryanr committed Feb 13, 2024
commit ceb9973657abf94508ac64f9c703d63d2b097bf0
5 changes: 2 additions & 3 deletions site/content/docs/howto/configure-auth-for-webapps.md
Original file line number Diff line number Diff line change
Expand Up @@ -277,9 +277,8 @@ The ID token returned at the end of the authorization code flow will contain the
- `nonce`: a string value used to associate a Client session with an ID Token, and to mitigate replay attacks

Refreshed ID tokens will contain the same claims, except that a refreshed ID token will also contain an `at_hash` claim,
and will not contain a `nonce` claim. (The original ID token should also contain an `at_hash` claim, but it is excluded
due to a bug in one of Pinniped's dependencies. The Pinniped maintainers have submitted a PR to that library to fix
the bug and are waiting for the next release of that library to incorporate the fix into Pinniped.)
and will not contain a `nonce` claim. The original ID token should also contain an `at_hash` claim, but it was excluded
in older versions of Pinniped due to a bug in one of Pinniped's dependencies, which has since been fixed.
benjaminapetersen marked this conversation as resolved.
Show resolved Hide resolved

Additionally, the following custom claims may be included in the ID tokens, if the client requested
the `username` and/or `groups` scopes in the original authorization request, and if the client is allowed to request those scopes:
Expand Down
Loading