angular-oauth2-oidc
Advanced tools
Comparing version 2.1.0 to 2.1.1
export declare class AuthConfig { | ||
/** | ||
* The client's id as registered with the auth server | ||
*/ | ||
clientId?: string; | ||
/** | ||
* The client's redirectUri as registered with the auth server | ||
*/ | ||
redirectUri?: string; | ||
/** | ||
* An optional second redirectUri where the auth server | ||
* redirects the user to after logging out. | ||
*/ | ||
postLogoutRedirectUri?: string; | ||
/** | ||
* The auth server's endpoint that allows to log | ||
* the user in when using implicit flow. | ||
*/ | ||
loginUrl?: string; | ||
/** | ||
* The requested scopes | ||
*/ | ||
scope?: string; | ||
resource?: string; | ||
rngUrl?: string; | ||
/** | ||
* Defines whether to use OpenId Connect during | ||
* implicit flow. | ||
*/ | ||
oidc?: boolean; | ||
/** | ||
* Defines whether to request a access token during | ||
* implicit flow. | ||
*/ | ||
requestAccessToken?: boolean; | ||
options?: any; | ||
/** | ||
* The issuer's uri. | ||
*/ | ||
issuer?: string; | ||
/** | ||
* The logout url. | ||
*/ | ||
logoutUrl?: string; | ||
/** | ||
* Defines whether to clear the hash fragment after logging in. | ||
*/ | ||
clearHashAfterLogin?: boolean; | ||
/** | ||
* Url of the token endpoint as defined by OpenId Connect and OAuth 2. | ||
*/ | ||
tokenEndpoint?: string; | ||
/** | ||
* Url of the userinfo endpoint as defined by OpenId Connect. | ||
* | ||
*/ | ||
userinfoEndpoint?: string; | ||
responseType?: string; | ||
/** | ||
* Defines whether additional debug information should | ||
* be shown at the console. | ||
*/ | ||
showDebugInformation?: boolean; | ||
/** | ||
* The redirect uri used when doing silent refresh. | ||
*/ | ||
silentRefreshRedirectUri?: string; | ||
silentRefreshMessagePrefix?: string; | ||
/** | ||
* Set this to true to display the iframe used for | ||
* silent refresh for debugging. | ||
*/ | ||
silentRefreshShowIFrame?: boolean; | ||
/** | ||
* Timeout for silent refresh. | ||
*/ | ||
siletRefreshTimeout?: number; | ||
/** | ||
* Some auth servers don't allow using password flow | ||
* w/o a client secreat while the standards do not | ||
* demand for it. In this case, you can set a password | ||
* here. As this passwort is exposed to the public | ||
* it does not bring additional security and is therefore | ||
* as good as using no password. | ||
*/ | ||
dummyClientSecret?: string; | ||
/** | ||
* Defines whether https is required. | ||
* The default value is remoteOnly which only allows | ||
* http for location, while every other domains need | ||
* to be used with https. | ||
*/ | ||
requireHttps?: boolean | 'remoteOnly'; | ||
/** | ||
* Defines whether every url provided by the discovery | ||
* document has to start with the issuer's url. | ||
*/ | ||
strictDiscoveryDocumentValidation?: boolean; | ||
/** | ||
* JSON Web Key Set (https://tools.ietf.org/html/rfc7517) | ||
* with keys used to validate received id_tokens. | ||
* This is taken out of the disovery document. Can be set manually too. | ||
*/ | ||
jwks?: object; | ||
/** | ||
* Map with additional query parameter that are appended to | ||
* the request when initializing implicit flow. | ||
*/ | ||
customQueryParams?: object; | ||
silentRefreshIFrameName?: string; | ||
/** | ||
* Defines when the token_timeout event should be raised. | ||
* If you set this to the default value 0.75, the event | ||
* is triggered after 75% of the token's life time. | ||
*/ | ||
timeoutFactor?: number; | ||
/** | ||
* If true, the lib will try to check whether the user | ||
* is still logged in on a regular basis as described | ||
* in http://openid.net/specs/openid-connect-session-1_0.html#ChangeNotification | ||
* @type {boolean} | ||
*/ | ||
sessionChecksEnabled?: boolean; | ||
/** | ||
* Intervall in msec for checking the session | ||
* according to http://openid.net/specs/openid-connect-session-1_0.html#ChangeNotification | ||
* @type {number} | ||
*/ | ||
sessionCheckIntervall?: number; | ||
/** | ||
* Url for the iframe used for session checks | ||
*/ | ||
sessionCheckIFrameUrl?: string; | ||
/** | ||
* Name of the iframe to use for session checks | ||
* @type {number} | ||
*/ | ||
sessionCheckIFrameName?: string; | ||
/** | ||
* This property has been introduced to disable at_hash checks | ||
@@ -4,0 +141,0 @@ * and is indented for Identity Provider that does not deliver |
{ | ||
"name": "angular-oauth2-oidc", | ||
"version": "2.1.0", | ||
"version": "2.1.1", | ||
"repository": { | ||
@@ -5,0 +5,0 @@ "type": "git", |
@@ -216,3 +216,3 @@ # angular-oauth2-oidc | ||
### Calling a Web API with an OAuth-Token | ||
### Calling a Web API with an Access Token | ||
@@ -219,0 +219,0 @@ Pass this Header to the used method of the ``Http``-Service within an Instance of the class ``Headers``: |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
188833
4503