You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/products/access/api-reference/config-api/web-client.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ JSON body parameters:
95
95
| client_secret | depends | "AF33E2BF29C54A4639AB…" | Client Secret (not returned on GET). Required when `client_authentication_method` is `CLIENT_SECRET_BASIC` or when `client_authentication_method` is not specified. |
96
96
| public_jwk | depends | EC or RSA public key | Plain public key for private key JWT authentication in the Elliptic Curve (min P-256) or RSA (min 2048, max 4096 key length) x509 format. OneWelcome Access will favour `jwks_uri` if provided over statically defined JWK. |
97
97
| jwks_uri | depends | "https://authorization-server/jwks"| Uri of JWKS endpoint with public keys for private key JWT authentication. |
98
-
| grant_types | yes |["CLIENT_CREDENTIALS"]| Set of Grant Types. Allowed values: `AUTHORIZATION_CODE`, `CLIENT_CREDENTIALS`and `DEVICE_CODE`. When `client_authentication_method` is `PKCE` the only allowed value is `AUTHORIZATION_CODE`.|
98
+
| grant_types | yes |["CLIENT_CREDENTIALS"]| Set of Grant Types. Allowed values: `AUTHORIZATION_CODE`, `CLIENT_CREDENTIALS`, `PASSWORD`and `DEVICE_CODE`. When `client_authentication_method` is `PKCE` the only allowed value is `AUTHORIZATION_CODE`. |
99
99
| access_token_format | no | "OPAQUE" | Format of the [Access Token](../../topics/tokens/access-token.md). Allowed values: `OPAQUE` (random string), `JWT` (JSON Web Token). Defaults to `OPAQUE` when omitted. The JWT access token contains the user identifier for grant types `AUTHORIZATION_CODE`. |
100
100
| redirect_url | yes | "https://example.com/redirect"| An URL to which the browser is redirected after successfully obtaining an Access grant. Required for Grant type `AUTHORIZATION_CODE`. |
101
101
| additional_redirect_urls | no |["https://example.org/redirect"]| Additional URLs that the user can be redirected to after successfully obtaining an Access grant. |
@@ -277,7 +277,7 @@ Only the fields that are sent in the request will be changed.
277
277
| client_secret | no | "AF33E2BF29C54A4639AB…" | Client Secret (not returned on GET) |
278
278
| public_jwk | depends | EC or RAS public key | Plain public key for private key JWT authentication in the Elliptic Curve (min P-256) or RSA (min 2048, max 4096 key length) x509 format. The OneWelcome Access will favour `jwks_uri` if provided over statically defined JWK. |
279
279
| jwks_uri | depends | "https://authorization-server/jwks"| Uri of JWKS endpoint with public keys for private key JWT authentication. |
280
-
| grant_types | no |["CLIENT_CREDENTIALS"]| Set of Grant Types. Allowed values: `AUTHORIZATION_CODE`, `CLIENT_CREDENTIALS`and `DEVICE_CODE`. When `client_authentication_method` is `PKCE` the only allowed value is `AUTHORIZATION_CODE`.|
280
+
| grant_types | no |["CLIENT_CREDENTIALS"]| Set of Grant Types. Allowed values: `AUTHORIZATION_CODE`, `CLIENT_CREDENTIALS`, `PASSWORD`and `DEVICE_CODE`. When `client_authentication_method` is `PKCE` the only allowed value is `AUTHORIZATION_CODE`. |
281
281
| access_token_format | no | "OPAQUE" | Format of the [Access Token](../../topics/tokens/access-token.md). Allowed values: `OPAQUE` (random string), `JWT` (JSON Web Token). The JWT access token contains the user identifier for grant type `AUTHORIZATION_CODE`. |
282
282
| redirect_url | no | "https://example.com/redirect"| An URL to which the browser is redirected after successfully obtaining an Access grant. Used with Grant type `AUTHORIZATION_CODE`. |
283
283
| additional_redirect_urls | no |["https://example.org/redirect"]| Additional URLs that the user can be redirected to after successfully obtaining an Access grant. |
OneWelcome Access supports all of these flows. However, only the authorization code grant and client credentials grant are recommended.
28
29
@@ -34,6 +35,8 @@ this flow.
34
35
* The client credentials flow returns an access token that gives access to resources for a specific client. For example, when the user requests the general
35
36
terms and conditions document, the resource server needs to know which client requests access to this document. The resource server does not need to know on
36
37
behalf of which user the client requests access. Obtaining the access token can be automated and does not require user interaction.
38
+
* The Resource Owner Password Credentials (ROPC) is deprecated and is no longer considered secure for most scenarios. See the topic
39
+
on [Resource owner password credentials](../topics/web-clients/resource-owner-password-credentials.md) for more information.
37
40
38
41
## Authorization endpoint
39
42
The authorization endpoint is used in the authorization code flow. In this flow, the
Copy file name to clipboardExpand all lines: docs/products/access/appendix/access-events.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -172,6 +172,9 @@
172
172
| TOKEN REQUEST INVALID PROFILE ID | Provided profile id has invalid format or is already used by other user of the client. |
173
173
| TOKEN REQUEST IMPLICIT AUTHENTICATION ACCESS TOKEN CREATED | An implicit authentication access token was created based on the provided client credentials, profile id and scopes. |
174
174
| TOKEN REQUEST IMPLICIT DEFAULT ACCESS TOKEN NOT FOUND | No default access token was found for the provided profile. |
175
+
| TOKEN REQUEST PASSWORD ACCESS TOKEN CREATED | The access token created using password grant |
| TOKEN REQUEST PASSWORD NOT SUPPORTED BY IDENTITY PROVIDER | The identity provider configured for this client does not support this authorization type. |
175
178
| TOKEN REQUEST REFRESH TOKEN RETRY COUNT EXCEEDED | The refresh token has been used wrongly for more than the maximum allowed retries. The refresh token is invalidated. |
176
179
| TOKEN RESPONSE GROUP PERMISSIONS EXCEEDED JWT LIMIT | The JWT access token with the claim [`group permissions`](../topics/tokens/access-token.md#group-permissions) has exceeded the configured length of a JWT access token. |
@@ -602,4 +605,3 @@ This section contains events for mobile authentication
602
605
| STORE KEY VALUE INVALID IDP TYPE | The identity provider that was specified was not of the OneWelcome type. |
603
606
| STORE KEY VALUE INVALID IDP CONFIG | The configuration on the OneWelcome IDP for the Storage API is not correct (bad or missing credentials). |
604
607
| STORE KEY VALUE FAILED | An error occurred when storing the value in the keystore. Typically an issue in the [Consumer Identity Manager](https://docs-single-tenant.onegini.com/cim/stable/idp) application. |
| Authorization code | Specifies whether the OAuth client can use the OAuth authorization code grant type in order to allow this web client to request an access token on behalf of the end-user. This is the only grant type that is allowed for public clients using PKCE as authentication method.
73
-
| Client credentials | Specifies whether a web client can use its client credentials to request an access token. Note that this access token is not linked to a user since it's solely requested by the web client without any user interaction. This function is typically used for machine-to-machine communication.
74
-
| Device code | Specifies whether a web client can use the OAuth Device Code Flow in order to allow this web client to request an access token on behalf of the end-user. This grant type is used for devices that do not have a browser or have limited input capabilities.
| Authorization code | Specifies whether the OAuth client can use the OAuth authorization code grant type in order to allow this web client to request an access token on behalf of the end-user. This is the only grant type that is allowed for public clients using PKCE as authentication method. |
73
+
| Client credentials | Specifies whether a web client can use its client credentials to request an access token. Note that this access token is not linked to a user since it's solely requested by the web client without any user interaction. This function is typically used for machine-to-machine communication. |
74
+
| Device code | Specifies whether a web client can use the OAuth Device Code Flow in order to allow this web client to request an access token on behalf of the end-user. This grant type is used for devices that do not have a browser or have limited input capabilities. |
75
+
| Resource owner password credentials | Specifies whether a web client can use the OAuth Resource Owner Password Credentials grant type in order to allow this web client to request an access token on behalf of the end-user. This grant type is not recommended and should be avoided if possible. See the topic on [Resource owner password credentials](resource-owner-password-credentials.md) for more information. |
0 commit comments