Sha256: 4412b0b151c18d42984620404ab4c80a4dae453d8cd24f854dea1f67f0d6a3cc
Contents?: true
Size: 1.56 KB
Versions: 1
Compression:
Stored size: 1.56 KB
Contents
This version passes the conformance tests for the following OpenID Connect certification profiles: * Basic certification * Form-post basic certification * Config certification * Dynamic Config certification (`response_type=code`) ## Breaking Changes * homepage url is no longer a client application required property. * OIDC RP-initiated logout extracted into `oidc_rp_initiated_logout` feature. ## Features * `oauth_jwt_secured_authorization_request` now supports a `request_uri` query param as well. * `oidc` supports essential claims, via the `claims` authorization request query parameter. ## Improvements * exposing `acr_values_supported` in the openid configuration. * `oauth_request_object_signing_alg_allow_none` enables `"none"` as an accepted request object signing alg when `true` (`false` by default). * OIDC `offline_access` supported. ## Bugfixes * JWT: "sub" is now always a string. * `response_type` is now an authorization request required parameter (as per the RFC). * `state` is now passed along when redirecting from authorization requeests with `error`; * access token can now be read from POST body or GET quety params (as per the RFC). * id token no longer shipping with claims with `null` value; * id token no longer encoding claims by default (only when `response_type=id_token`, as per the RFC). * support "JWT without kid" when doing jwt decoding for JWT tokens not generated in the provider (such as request objects). * Set `iss` and `aud` claims in the Userinfo JWT response. * Make sure errors are also delivered via form POST, when `response_mode=form_post`.
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
rodauth-oauth-1.0.0.pre.beta2 | doc/release_notes/1_0_0_beta2.md |