summaryrefslogtreecommitdiff
path: root/docs/oauth2
Commit message (Collapse)AuthorAgeFilesLines
* docs: fix typosKian-Meng Ang2022-07-064-4/+4
|
* docs: Fix a few typosTim Gates2022-07-031-2/+2
| | | | | | | | | | | | | | | | | | | | | | There are small typos in: - docs/oauth1/security.rst - docs/oauth2/grants/custom_grant.rst - oauthlib/oauth2/rfc6749/clients/backend_application.py - oauthlib/oauth2/rfc6749/clients/base.py - oauthlib/oauth2/rfc6749/clients/legacy_application.py - oauthlib/oauth2/rfc6749/clients/service_application.py - oauthlib/oauth2/rfc6749/clients/web_application.py - oauthlib/oauth2/rfc6749/endpoints/revocation.py - oauthlib/oauth2/rfc6749/parameters.py - oauthlib/openid/connect/core/grant_types/dispatchers.py Fixes: - Should read `parameters` rather than `paramters`. - Should read `instantiate` rather than `instanciate`. - Should read `successfully` rather than `sucessfully`. - Should read `present` rather than `pressent`. - Should read `parameter` rather than `paramater`. - Should read `efficient` rather than `effecient`.
* Fix typo in server.rstNemanja Tozic2022-05-251-1/+1
| | | missing semicolon
* Docs: fix Sphinx warnings for better ReadTheDocs generation (#807)Jonathan Huot2022-02-245-5/+8
| | | | | | | | | | | | | | | | | | | | | | | * Fix list of current features for 3.2.0 * Renamed travis-ci.org icon URLs * Force fixing the warnings in the docs generation * Removed unused folder reference * Added orphean documents into summary. * Fix docstring formatting example in contributing page. * Removed unused argument from documentation * Fix sphinx warning resulting in loss of formatting in RTD. * Force setuptools until https://github.com/pypa/setuptools/issues/3118 is fixed * Prevent linux redirection in travis instructions * Add graphviz/dot command to generate docs frmo Travis
* Add support for device authorization flow (RFC8628) (#795)Mike Kelly2022-01-181-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | * rfc8628: Add client implementation for token retrieval This change adds an implementation of the Device Authorization flow client from RFC8628. The initial structure is derived from the existing BackendApplicationClient with the addition of the device_code in the client. This change does not provide the support necessary for querying the device code endpoint in order to generate the initial device_code and URL that is required for completing the full end to end device authorization process. * Add device token fetch URI generator In order to perform the full device authorization flow it's necessary to first generate the device code and get the authorization flow URL. prepare_request_uri() allows us to do this while providing scopes and additional parameters. * Remove encoding lines These lines are not required for python3
* Add docsNikos Sklikas2021-06-031-0/+6
|
* OAuth 1.0a signature methods: RSA-SHA256, RSA-SHA512 and HMAC-SHA512 (#723)Hoylen Sue2020-06-031-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Adding support for RSA-SHA256. * Added support for HMAC-SHA512, RSA-SHA256 and RSA-SHA512 signature methods. * Made version dependencies consistent. * Updated OAuth1 signature tests. * Fixed parsing of netloc/host. Deprecated old functions. * Refactored and expanded tests to include signature validate. * Update docs for HMAC-SHA512, RSA-SHA256 and RSA-SHA512 signature methods. * Updated code comments in oauth1 signatures module. * Updated changelog. * Update docs/feature_matrix.rst Co-Authored-By: Omer Katz <omer.drow@gmail.com> * Used parenthesis instead of backslash to break lines. * Fixed typo Co-authored-by: Omer Katz <omer.drow@gmail.com> Co-authored-by: Omer Katz <omer.drow@gmail.com>
* Merge branch 'master' into doc-oidcJonathan Huot2020-01-295-11/+126
|\
| * Update server.rst docs to include request uri in auth code (#714)Jonathan Huot2020-01-291-0/+11
| |\ | | | | | | Update server.rst docs to include request uri in auth code
| | * update server.rst docs necessary auth code fieldsDan Piet2020-01-131-0/+11
| | |
| * | Removed newline/autoformatting mistake fixedJonathan Huot2020-01-151-2/+2
| | |
| * | Improve clarity around howto define a grant.Jonathan Huot2019-10-281-26/+41
| | |
| * | Add custom grant exampleJonathan Huot2019-10-251-6/+20
| | |
| * | Added clarity about ROPC & usage from RFCJonathan Huot2019-10-251-2/+4
| | |
| * | Initial custom grant type documentation.Jonathan Huot2019-10-184-11/+84
| |/ | | | | | | Improved Grant Type section to let developers create or implement their own custom grant type. Or also help them implementing new RFC.
* | Improved OIDC documentationdoc-oidcJonathan Huot2019-10-289-14/+147
|/
* Merge branch 'master' into docs-flows-hooksdocs-flows-hooksJonathan Huot2019-08-011-0/+1
|\
| * Add UserInfoEndpoint to the OIDC Provider support.Jonathan Huot2019-05-131-0/+1
| |
* | Merge branch 'master' into docs-flows-hooksJonathan Huot2019-07-091-8/+9
|\ \ | |/
| * Merge branch 'master' into oidc-hashesJonathan Huot2019-04-261-0/+3
| |\
| * | Renamed fill into finalize to add clarityJonathan Huot2019-03-261-3/+3
| | |
| * | Add technicals fields of `id_token` in oauthlib OIDC supportJonathan Huot2019-02-281-8/+9
| | | | | | | | | | | | A new RequestValidator `fill_id_token` has been introduced to replace `get_id_token`. It aims to have the bare minimum amount of fields to complete a full OIDC id_token support. `get_id_token` is still valid but optional, and if it is implemented, `fill_id_token` will not be called. The current `fill_id_token` came with full support of `aud`, `iat`, `nonce`, `at_hash` and `c_hash`. More could come in the future e.g. `auth_time`, ...
| * | Removed duplicated OIDC members in OAuth2.RequestValidatorJonathan Huot2019-02-281-2/+4
| | |
* | | Add hooks to highlight the possibilities of the frameworkJonathan Huot2019-04-301-18/+69
| |/ |/| | | | | The grey color has been used to show that's optional, and a loop arrow to represent that multiple hooks can be stacked. We can distinctly see three kind of hooks: 1) pre/post+token/auth 2) generate access/refresh tokens 3) code/token modifiers. Also, I have added the optional RequestValidator.rotate_refresh_token callback.
* | Update documentationAbhishek Patel2019-04-231-0/+3
| |
* | Removed duplicated OIDC members in OAuth2.RequestValidatorJonathan Huot2019-02-281-2/+4
|/
* Fixed graphviz/dot graph & improved clarity (#642)Jonathan Huot2019-01-082-27/+80
| | | | | | I fixed graphviz missing output to web responses (see image of https://github.com/oauthlib/oauthlib/pull/639), and I have added a fixed rank (`rank=same`) when functions are achieving an identical goal. E.g. `validate_client_id`, `validate_user`, `validate_bearer_token` are unique for each flows, or, e.g. `confirm_redirect_uri`, `validate_redirect_uri` together, and so on. ![graphviz-0cc58e8637b94d7402eda45a1fef6e68889bd8e1](https://user-images.githubusercontent.com/820496/50830407-042ad600-1348-11e9-936a-03d07f42494f.png)
* Add OAuth2 Provider oauthlib-flowJonathan Huot2018-12-283-6/+263
|
* Merge branch 'master' into add-metadata-docJonathan Huot2018-12-161-0/+11
|\
| * challenge can have a length of 128 when using maximum size of verifier+plain.Jonathan Huot2018-12-131-1/+1
| |
| * Initial OAuth2.0/PKCE Provider supportJonathan Huot2018-11-291-0/+11
| |
* | Add metadata documentation with quick exampleJonathan Huot2018-12-131-0/+72
| |
* | Add OAuth2.0 Authorization Server Metadata documentationJonathan Huot2018-12-131-2/+4
|/
* Add OIDC and id_token as JWT exampleoidc-docJonathan Huot2018-11-233-6/+60
|
* Remove last remaining G+ reference. (#598)Pieter Ennes2018-09-151-1/+1
| | | (Cherry picked from f3ae98cef91e140b10d25fbd496622d879cc0c0c)
* Merge branch 'master' into docs-jwtJonathan Huot2018-08-101-2/+2
|\
| * Removed last occurences of G+ with GitterJonathan Huot2018-08-101-2/+2
| |
* | Added access_token as JWT examples, and updated JWT grant sectionJonathan Huot2018-08-104-11/+131
|/ | | | A confusion between JWT as token and as authentication mechanism was introduced long-time back and I tried to make a bit of clarity to not confuse again the newcomers.
* Merge branch 'master' into oauth2-introspectPieter Ennes2018-05-267-11/+15
|\
| * Rtd docs fix (#515)Jonathan Huot2018-02-286-8/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Added sphinx build for developers Rationale is to build docs locally to prevent RTD to break later. * Replace manual sphinx into make * Renamed idan URL to oauthlib community * Renamed http into https URLs since http is returning 302 * python requests library renamed its home URL * Add ignore list for "make linkcheck" linkcheck is doing requests to github with anonymous access, however creating an issue require an logged-in account * virtualenv changed its homepage and website. * Fixed broken link
| * Added bottle-oauthlib (#509)Jonathan Huot2018-01-022-3/+7
| |
* | Added initial introspect supportJonathan Huot2017-12-182-1/+31
|/
* Updated docs for custom validatorsBrendan McCollam2016-12-222-1/+7
|
* Docs for custom validator registrationBrendan McCollam2016-12-225-0/+10
|
* Merge pull request #416 from joelstevenson/openid_connectOmer Katz2016-08-283-0/+39
|\ | | | | Openid connect
| * Move the claims handling into OpenIDConnectBase._inflate_claims() and a new ↵Joel Stevenson2016-08-183-0/+39
| | | | | | | | | | | | AuthCodeGrantDispatcher to route requests to either the default AuthorizationCodeGrant or OpenIDConnectAuthCode depending on scope when the request's response_type is a simple (ambiguous) 'code'. Include basic docs about OpenID Connect auth flow support
* | access -> accessedThomas Bartelmess2016-04-131-1/+1
|/
* Code ident in server docYohan Boniface2015-10-261-8/+8
|
* Merge pull request #325 from djmitche/token_generator_fixOmer Katz2015-07-191-1/+3
|\ | | | | Fix documentation for token_generator signature
| * Fix documentation for token_generator signatureDustin J. Mitchell2015-02-271-1/+3
| |