mirror of
https://gitee.com/dcren/openiddict-documentation.git
synced 2025-04-05 08:37:30 +08:00
Tweak the DiscordFX theme
This commit is contained in:
parent
a3fa2d4107
commit
b4710a4969
@ -1,8 +1,9 @@
|
||||
# Token formats
|
||||
|
||||
> [!NOTE]
|
||||
> In OpenIddict 3.0, being able to revoke a token is not tied to the token format and doesn't require enabling reference tokens:
|
||||
> regular JWT or ASP.NET Core Data Protection tokens can be revoked as long as token storage is not explicitly disabled by the developer
|
||||
> In OpenIddict 3.0, the ability to revoke a token is not tied to the token format and doesn't require enabling reference tokens:
|
||||
> regular JWT or ASP.NET Core Data Protection tokens can be revoked as long as token storage is not explicitly disabled in the server options.
|
||||
>
|
||||
>
|
||||
> For more information about reference tokens, read [Token storage](token-storage.md).
|
||||
|
||||
@ -42,15 +43,15 @@ OpenIddict 3.0 can also be configured to use [ASP.NET Core Data Protection](http
|
||||
Data Protection tokens instead of JWT tokens. ASP.NET Core Data Protection uses its own key ring to encrypt and protect tokens against tampering and is supported for all
|
||||
types of tokens, except identity tokens, that are always JWT tokens.
|
||||
|
||||
Unlike JWT, ASP.NET Core Data Protection tokens only support symmetric encryption and rely on a binary format developed by the ASP.NET team rather than on a standard like JWT.
|
||||
Unlike JWTs, ASP.NET Core Data Protection tokens only support symmetric encryption and rely on a binary format developed by the ASP.NET team rather than on a standard like JWT.
|
||||
While this prevents using such tokens in scenarios where interoperability is needed, opting for ASP.NET Core Data Protection rather than JWT has actually a few advantages:
|
||||
- ASP.NET Core Data Protection tokens don't use a JSON representation and therefore are generally a bit shorter.
|
||||
- ASP.NET Core Data Protection has been designed to achieve high throughput as it's natively used by ASP.NET Core for authentication cookies,
|
||||
antiforgery tokens and session cookies.
|
||||
|
||||
> [!WARNING]
|
||||
> Despite its name, ASP.NET Core Data Protection is not tied to ASP.NET Core and can be used in any
|
||||
> .NET Standard 2.0-compatible application, including legacy ASP.NET 4.x applications using `Microsoft.Owin`.
|
||||
> Despite its name, ASP.NET Core Data Protection is not tied to ASP.NET Core and can be used in any .NET Standard 2.0-compatible
|
||||
> application, including legacy ASP.NET 4.6.1 (and higher) applications using `Microsoft.Owin`.
|
||||
>
|
||||
> To enable ASP.NET Core Data Protection support in the OpenIddict OWIN server and validation hosts, you need to
|
||||
> manually reference the `OpenIddict.Server.DataProtection` and `OpenIddict.Validation.DataProtection` packages.
|
||||
@ -80,8 +81,8 @@ services.AddOpenIddict()
|
||||
> existing tokens can still be used alongside newly issued ASP.NET Core Data Protection tokens until they expire. When sending a refresh token request containing
|
||||
> a JWT refresh token, the application will receive an ASP.NET Core Data Protection refresh token and the previous one will be automatically marked as redeemed.
|
||||
|
||||
By default, enabling ASP.NET Core Data Protection support will automatically switch the token format from JWT to Data Protection for all tokens, except JWT tokens.
|
||||
The OpenIddict/Data Protection integration can be configured to prefer JWT when creating new tokens, **which can be useful to use the ASP.NET Core Data Protection
|
||||
By default, enabling ASP.NET Core Data Protection support will automatically switch the token format from JWT to Data Protection for all types of tokens, except JWT tokens.
|
||||
The OpenIddict/Data Protection integration can be configured to prefer JWT when creating new tokens, **which can be useful when using the ASP.NET Core Data Protection
|
||||
format for specific token types only** (e.g for authorization codes and refresh tokens, but not for access tokens).
|
||||
|
||||
```csharp
|
||||
@ -99,7 +100,7 @@ services.AddOpenIddict()
|
||||
|
||||
> [!WARNING]
|
||||
> When the authorization and API/resource servers are not part of the same application, ASP.NET Core Data Protection MUST be configured to use
|
||||
> the same application name and share the same key ring to allow OpenIddict validation's handler to read ASP.NET Core Data Protection tokens
|
||||
> the same application name and share the same key ring to allow the OpenIddict validation handler to read ASP.NET Core Data Protection tokens
|
||||
> generated by an authorization server located in another project.
|
||||
>
|
||||
> For more information, read [Configure ASP.NET Core Data Protection](https://docs.microsoft.com/en-us/aspnet/core/security/data-protection/configuration/overview).
|
@ -13,8 +13,8 @@ Such tokens – called reference tokens – are not returned as-is to the caller
|
||||
or with resource servers (if reference access tokens are enabled in the server options).
|
||||
|
||||
> [!NOTE]
|
||||
> In OpenIddict 3.0, being able to revoke a token is not tied to the token format and doesn't require enabling reference tokens:
|
||||
> regular JWT or ASP.NET Core Data Protection tokens can be revoked as long as token storage is not explicitly disabled by the developer.
|
||||
> In OpenIddict 3.0, the ability to revoke a token is not tied to the token format and doesn't require enabling reference tokens:
|
||||
> regular JWT or ASP.NET Core Data Protection tokens can be revoked as long as token storage is not explicitly disabled in the server options.
|
||||
|
||||
## Enabling reference access and/or refresh tokens
|
||||
|
||||
|
@ -38,7 +38,9 @@
|
||||
"globalMetadataFiles": [],
|
||||
"globalMetadata": {
|
||||
"_appFaviconPath": "images/favicon.ico",
|
||||
"_appLogoPath": "images/logo.png"
|
||||
"_appLogoPath": "images/logo.png",
|
||||
"_appName": "OpenIddict",
|
||||
"_disableSideFilter": true
|
||||
},
|
||||
"fileMetadataFiles": [],
|
||||
"template": [
|
||||
|
4
index.md
4
index.md
@ -3,8 +3,8 @@
|
||||
|
||||
# OpenIddict: the OpenID Connect stack you'll be addicted to
|
||||
|
||||
OpenIddict aims at providing a **versatile solution** to implement an **OpenID Connect server and token validation in any ASP.NET Core 2.1, 3.1 and 5.0 application**,
|
||||
and starting in OpenIddict 3.0, **any ASP.NET 4.x or OWIN application too**.
|
||||
OpenIddict aims at providing a **versatile solution** to implement an **OpenID Connect server and token validation in any ASP.NET Core 2.1 (and higher) application**.
|
||||
**ASP.NET 4.6.1 (and higher) applications are also fully supported thanks to a native Microsoft.Owin 4.2 integration**.
|
||||
|
||||
OpenIddict fully supports the **[code/implicit/hybrid flows](https://openid.net/specs/openid-connect-core-1_0.html)**, the **[client credentials/resource owner password grants](https://tools.ietf.org/html/rfc6749)** and the [device authorization flow](https://tools.ietf.org/html/rfc8628). You can also create your own custom grant types.
|
||||
|
||||
|
@ -11,7 +11,7 @@
|
||||
<a href="{{topicHref}}" class="sidebar-item" name="{{tocHref}}" title="{{name}}">{{name}}</a>
|
||||
{{/topicHref}}
|
||||
{{^topicHref}}
|
||||
<a>{{{name}}}</a>
|
||||
<a class="sidebar-item" name="{{tocHref}}" title="{{name}}">{{{name}}}</a>
|
||||
{{/topicHref}}
|
||||
|
||||
{{^leaf}}
|
||||
|
Loading…
Reference in New Issue
Block a user