angular-oauth2-oidc
Advanced tools
Comparing version
export declare class AuthConfig { | ||
/** | ||
* The client's id as registered with the auth server | ||
*/ | ||
clientId?: string; | ||
/** | ||
* The client's redirectUri as registered with the auth server | ||
*/ | ||
redirectUri?: string; | ||
/** | ||
* An optional second redirectUri where the auth server | ||
* redirects the user to after logging out. | ||
*/ | ||
postLogoutRedirectUri?: string; | ||
/** | ||
* The auth server's endpoint that allows to log | ||
* the user in when using implicit flow. | ||
*/ | ||
loginUrl?: string; | ||
/** | ||
* The requested scopes | ||
*/ | ||
scope?: string; | ||
resource?: string; | ||
rngUrl?: string; | ||
/** | ||
* Defines whether to use OpenId Connect during | ||
* implicit flow. | ||
*/ | ||
oidc?: boolean; | ||
/** | ||
* Defines whether to request a access token during | ||
* implicit flow. | ||
*/ | ||
requestAccessToken?: boolean; | ||
options?: any; | ||
/** | ||
* The issuer's uri. | ||
*/ | ||
issuer?: string; | ||
/** | ||
* The logout url. | ||
*/ | ||
logoutUrl?: string; | ||
/** | ||
* Defines whether to clear the hash fragment after logging in. | ||
*/ | ||
clearHashAfterLogin?: boolean; | ||
/** | ||
* Url of the token endpoint as defined by OpenId Connect and OAuth 2. | ||
*/ | ||
tokenEndpoint?: string; | ||
/** | ||
* Url of the userinfo endpoint as defined by OpenId Connect. | ||
* | ||
*/ | ||
userinfoEndpoint?: string; | ||
responseType?: string; | ||
/** | ||
* Defines whether additional debug information should | ||
* be shown at the console. | ||
*/ | ||
showDebugInformation?: boolean; | ||
/** | ||
* The redirect uri used when doing silent refresh. | ||
*/ | ||
silentRefreshRedirectUri?: string; | ||
silentRefreshMessagePrefix?: string; | ||
/** | ||
* Set this to true to display the iframe used for | ||
* silent refresh for debugging. | ||
*/ | ||
silentRefreshShowIFrame?: boolean; | ||
/** | ||
* Timeout for silent refresh. | ||
*/ | ||
siletRefreshTimeout?: number; | ||
/** | ||
* Some auth servers don't allow using password flow | ||
* w/o a client secreat while the standards do not | ||
* demand for it. In this case, you can set a password | ||
* here. As this passwort is exposed to the public | ||
* it does not bring additional security and is therefore | ||
* as good as using no password. | ||
*/ | ||
dummyClientSecret?: string; | ||
/** | ||
* Defines whether https is required. | ||
* The default value is remoteOnly which only allows | ||
* http for location, while every other domains need | ||
* to be used with https. | ||
*/ | ||
requireHttps?: boolean | 'remoteOnly'; | ||
/** | ||
* Defines whether every url provided by the discovery | ||
* document has to start with the issuer's url. | ||
*/ | ||
strictDiscoveryDocumentValidation?: boolean; | ||
/** | ||
* JSON Web Key Set (https://tools.ietf.org/html/rfc7517) | ||
* with keys used to validate received id_tokens. | ||
* This is taken out of the disovery document. Can be set manually too. | ||
*/ | ||
jwks?: object; | ||
/** | ||
* Map with additional query parameter that are appended to | ||
* the request when initializing implicit flow. | ||
*/ | ||
customQueryParams?: object; | ||
silentRefreshIFrameName?: string; | ||
/** | ||
* Defines when the token_timeout event should be raised. | ||
* If you set this to the default value 0.75, the event | ||
* is triggered after 75% of the token's life time. | ||
*/ | ||
timeoutFactor?: number; | ||
/** | ||
* If true, the lib will try to check whether the user | ||
* is still logged in on a regular basis as described | ||
* in http://openid.net/specs/openid-connect-session-1_0.html#ChangeNotification | ||
* @type {boolean} | ||
*/ | ||
sessionChecksEnabled?: boolean; | ||
/** | ||
* Intervall in msec for checking the session | ||
* according to http://openid.net/specs/openid-connect-session-1_0.html#ChangeNotification | ||
* @type {number} | ||
*/ | ||
sessionCheckIntervall?: number; | ||
/** | ||
* Url for the iframe used for session checks | ||
*/ | ||
sessionCheckIFrameUrl?: string; | ||
/** | ||
* Name of the iframe to use for session checks | ||
* @type {number} | ||
*/ | ||
sessionCheckIFrameName?: string; | ||
/** | ||
* This property has been introduced to disable at_hash checks | ||
@@ -4,0 +141,0 @@ * and is indented for Identity Provider that does not deliver |
{ | ||
"name": "angular-oauth2-oidc", | ||
"version": "2.1.0", | ||
"version": "2.1.1", | ||
"repository": { | ||
@@ -5,0 +5,0 @@ "type": "git", |
@@ -216,3 +216,3 @@ # angular-oauth2-oidc | ||
### Calling a Web API with an OAuth-Token | ||
### Calling a Web API with an Access Token | ||
@@ -219,0 +219,0 @@ Pass this Header to the used method of the ``Http``-Service within an Instance of the class ``Headers``: |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
188833
0.04%4503
1.51%