- 28 Apr, 2020 1 commit
-
-
Darryl Woods authored
-
- 11 Jun, 2019 1 commit
-
-
Darryl Woods authored
-
- 17 Oct, 2018 3 commits
-
-
-
-
Juan Ignacio Fiorentino authored
-
- 15 Oct, 2018 5 commits
-
-
Juan Ignacio Fiorentino authored
-
Juan Ignacio Fiorentino authored
Make version available in code (#282)
-
Juan Ignacio Fiorentino authored
Token Introspection docs (#257)
-
Christian Bouvier authored
-
Christian Bouvier authored
-
- 14 Oct, 2018 2 commits
-
-
Christian Bouvier authored
It seems like there are multi ways to achieve that, all of them highliting the importance of maintain a single source of truth for the version number. More info: https://packaging.python.org/guides/single-sourcing-package-version/. This PR includes one possible approach, open to discussion.
-
Christian Bouvier authored
Added a new doc page related to Token Introspection Endpoint. The documentation includes some introduction with links to the related RFCs and examples.
-
- 05 Oct, 2018 4 commits
-
-
Juan Ignacio Fiorentino authored
-
Juan Ignacio Fiorentino authored
-
Juan Ignacio Fiorentino authored
Enhancement: Increment RSA key size to 2048.
-
Christian Bouvier authored
It seems like many lead institutions related with security are recommending a minimum key length of 112-bits since 2013. In order to achieve that, a RSA key size of 2048 (or more) is required.
-
- 04 Oct, 2018 2 commits
-
-
Juan Ignacio Fiorentino authored
Enhancement: AuthorizeView's static method strip-prompt-login moved
-
Christian Bouvier authored
Enhancement: AuthorizeView's static method strip-prompt-login was moved to a new file oidc_provider/lib/utils/authorize.py in order to be more consistent with the implementation of other Views
-
- 03 Oct, 2018 3 commits
-
-
Juan Ignacio Fiorentino authored
-
Juan Ignacio Fiorentino authored
Fix #283: bug in strip_prompt_login
-
Christian Bouvier authored
AuthorizeView's static method strip_prompt_login fails to remove prompt login when other prompt values appear in the request.
-
- 29 Sep, 2018 5 commits
-
-
Juan Ignacio Fiorentino authored
-
Juan Ignacio Fiorentino authored
Fixed #285 -- Ensured standard and custom claims can be used at the same time when using the OIDC_IDTOKEN_INCLUDE_CLAIMS setting
-
Juan Ignacio Fiorentino authored
Revert "Fixed #285 -- Ensured standard and custom claims can be used at the same time when using the OIDC_IDTOKEN_INCLUDE_CLAIMS setting"
-
Juan Ignacio Fiorentino authored
Revert "Fixed #285 -- Ensured standard and custom claims can be used at the same time when using the OIDC_IDTOKEN_INCLUDE_CLAIMS setting"
-
Juan Ignacio Fiorentino authored
Fixed #285 -- Ensured standard and custom claims can be used at the same time when using the OIDC_IDTOKEN_INCLUDE_CLAIMS setting
-
- 28 Sep, 2018 1 commit
-
-
Morgan Aubert authored
Fixed #285 -- Ensured standard and custom claims can be used at the same time when using the OIDC_IDTOKEN_INCLUDE_CLAIMS setting
-
- 14 Sep, 2018 4 commits
-
-
Juan Ignacio Fiorentino authored
Django 2.1
-
Juan Ignacio Fiorentino authored
Merge pull request #279 from ByteInternet/make_authorization_endpoint_and_client_more_easily_adjustable Make it easier to change AuthorizeEndpoint and Client
-
Juan Ignacio Fiorentino authored
Add missing space
-
Bono de Visser authored
To make it easier to change the AuthorizeEndpoint and Client we set them as class variables. Then people inheriting from the view are able to easily change them. In my personal case this helps with skipping consent more explicitly as defined in issue https://github.com/juanifioren/django-oidc-provider/issues/278
-
- 13 Sep, 2018 1 commit
-
-
Isaac Slavitt authored
-
- 20 Aug, 2018 2 commits
-
-
Juan Ignacio Fiorentino authored
add natural key support to ResponseType
-
Andy Clayton authored
Have the option to use the more readable response type value rather than the ResponseType id integer in fixtures and dumpdata output. Prior to this change dumpdata represents response types like so: "response_types": [2] And after this change when using `dumpdata --natural-foreign`: "response_types": [["code"]]
-
- 17 Aug, 2018 2 commits
-
-
Juan Ignacio Fiorentino authored
support multiple response types per client
-
Andy Clayton authored
-
- 16 Aug, 2018 3 commits
-
-
Andy Clayton authored
-
Andy Clayton authored
-
Andy Clayton authored
The Dynamic Client Registration spec specifies multiple response_types and grant_types per client (https://openid.net/specs/openid-connect-registration-1_0.html#ClientMetadata). Since grant_types can be inferred from response_types we should be able to support both without needing to store grant_types. This also helps with oidc-client-js which expects a client that supports both "id_token" and "id_token token".
-
- 03 Aug, 2018 1 commit
-
-
Juan Ignacio Fiorentino authored
-