mirror of
https://github.com/bitwarden/server.git
synced 2024-11-28 13:15:12 +01:00
87fd4ad97d
* Upgrade to Duende.Identity * Linting * Get rid of last IdentityServer4 package * Fix identity test since Duende returns additional configuration * Use Configure PostConfigure is ran after ASP.NET's PostConfigure so ConfigurationManager was already configured and our HttpHandler wasn't being respected. * Regenerate lockfiles * Move to 6.0.4 for patches * fixes with testing * Add additional grant type supported in 6.0.4 and beautify * Lockfile refresh * Reapply lockfiles * Apply change to new WebAuthn logic * When automated merging fails me --------- Co-authored-by: Justin Baur <19896123+justindbaur@users.noreply.github.com> Co-authored-by: Kyle Spearrin <kyle.spearrin@gmail.com>
82 lines
2.0 KiB
JSON
82 lines
2.0 KiB
JSON
{
|
|
"issuer": "http://localhost",
|
|
"jwks_uri": "http://localhost:33656/.well-known/openid-configuration/jwks",
|
|
"authorization_endpoint": "http://localhost:33656/connect/authorize",
|
|
"token_endpoint": "http://localhost:33656/connect/token",
|
|
"device_authorization_endpoint": "http://localhost:33656/connect/deviceauthorization",
|
|
"backchannel_authentication_endpoint": "http://localhost:33656/connect/ciba",
|
|
"scopes_supported": [
|
|
"api",
|
|
"api.push",
|
|
"api.licensing",
|
|
"api.organization",
|
|
"api.installation",
|
|
"internal",
|
|
"api.secrets",
|
|
"offline_access"
|
|
],
|
|
"claims_supported": [
|
|
"name",
|
|
"email",
|
|
"email_verified",
|
|
"sstamp",
|
|
"premium",
|
|
"device",
|
|
"orgowner",
|
|
"orgadmin",
|
|
"orgmanager",
|
|
"orguser",
|
|
"orgcustom",
|
|
"providerprovideradmin",
|
|
"providerserviceuser",
|
|
"accesssecretsmanager",
|
|
"sub",
|
|
"organization"
|
|
],
|
|
"grant_types_supported": [
|
|
"authorization_code",
|
|
"client_credentials",
|
|
"refresh_token",
|
|
"implicit",
|
|
"password",
|
|
"urn:ietf:params:oauth:grant-type:device_code",
|
|
"urn:openid:params:grant-type:ciba",
|
|
"webauthn"
|
|
],
|
|
"response_types_supported": [
|
|
"code",
|
|
"token",
|
|
"id_token",
|
|
"id_token token",
|
|
"code id_token",
|
|
"code token",
|
|
"code id_token token"
|
|
],
|
|
"response_modes_supported": ["form_post", "query", "fragment"],
|
|
"token_endpoint_auth_methods_supported": [
|
|
"client_secret_basic",
|
|
"client_secret_post"
|
|
],
|
|
"id_token_signing_alg_values_supported": ["RS256"],
|
|
"subject_types_supported": ["public"],
|
|
"code_challenge_methods_supported": ["plain", "S256"],
|
|
"request_parameter_supported": true,
|
|
"request_object_signing_alg_values_supported": [
|
|
"RS256",
|
|
"RS384",
|
|
"RS512",
|
|
"PS256",
|
|
"PS384",
|
|
"PS512",
|
|
"ES256",
|
|
"ES384",
|
|
"ES512",
|
|
"HS256",
|
|
"HS384",
|
|
"HS512"
|
|
],
|
|
"authorization_response_iss_parameter_supported": true,
|
|
"backchannel_token_delivery_modes_supported": ["poll"],
|
|
"backchannel_user_code_parameter_supported": true
|
|
}
|