How to use the angular-auth-oidc-client.AuthWellKnownEndpoints function in angular-auth-oidc-client

To help you get started, we’ve selected a few angular-auth-oidc-client examples, based on popular ways it is used in public projects.

Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.

github damienbod / AspNetCoreOpeniddictAngularImplicitFlow / AngularOpenidImplicitFlowClient / angularApp / app / app.module.ts View on Github external
openIDImplicitFlowConfiguration.scope = 'dataEventRecords openid';
        openIDImplicitFlowConfiguration.post_logout_redirect_uri = 'https://localhost:44308/Unauthorized';
        openIDImplicitFlowConfiguration.start_checksession = false;
        openIDImplicitFlowConfiguration.silent_renew = true;
        openIDImplicitFlowConfiguration.post_login_route = '/dataeventrecords';
        // HTTP 403
        openIDImplicitFlowConfiguration.forbidden_route = '/Forbidden';
        // HTTP 401
        openIDImplicitFlowConfiguration.unauthorized_route = '/Unauthorized';
        openIDImplicitFlowConfiguration.log_console_warning_active = true;
        openIDImplicitFlowConfiguration.log_console_debug_active = false;
        // id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,
        // limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.
        openIDImplicitFlowConfiguration.max_id_token_iat_offset_allowed_in_seconds = 10;

        const authWellKnownEndpoints = new AuthWellKnownEndpoints();
        authWellKnownEndpoints.setWellKnownEndpoints(this.oidcConfigService.wellKnownEndpoints);

        this.oidcSecurityService.setupModule(openIDImplicitFlowConfiguration, authWellKnownEndpoints);

        });
github HWouters / ad-b2c-oidc-angular / src / app / app.module.ts View on Github external
const openIDImplicitFlowConfiguration = new OpenIDImplicitFlowConfiguration();
            openIDImplicitFlowConfiguration.stsServer = 'https://login.microsoftonline.com/tfp/fabrikamb2c.onmicrosoft.com/b2c_1_susi/oauth2/v2.0/';
            openIDImplicitFlowConfiguration.redirect_url = 'http://localhost:65328/redirect.html';
            openIDImplicitFlowConfiguration.client_id = 'e760cab2-b9a1-4c0d-86fb-ff7084abd902';
            openIDImplicitFlowConfiguration.response_type = 'id_token token';
            openIDImplicitFlowConfiguration.scope = 'openid https://fabrikamb2c.onmicrosoft.com/demoapi/demo.read';
            openIDImplicitFlowConfiguration.post_logout_redirect_uri = 'http://localhost:65328';
            openIDImplicitFlowConfiguration.post_login_route = '/home';
            openIDImplicitFlowConfiguration.forbidden_route = '/home';
            openIDImplicitFlowConfiguration.unauthorized_route = '/home';
            openIDImplicitFlowConfiguration.auto_userinfo = false;
            openIDImplicitFlowConfiguration.log_console_warning_active = true;
            openIDImplicitFlowConfiguration.log_console_debug_active = !environment.production;
            openIDImplicitFlowConfiguration.max_id_token_iat_offset_allowed_in_seconds = 30;

            const authWellKnownEndpoints = new AuthWellKnownEndpoints();
            authWellKnownEndpoints.setWellKnownEndpoints(this.oidcConfigService.wellKnownEndpoints);

            this.oidcSecurityService.setupModule(openIDImplicitFlowConfiguration, authWellKnownEndpoints);

        });
github damienbod / angular-auth-oidc-client / projects / sample-code-flow / src / app / app.module.ts View on Github external
config.client_id = 'angularClient';
            config.scope = 'openid profile email';
            config.response_type = 'code';

            config.silent_renew = true;
            config.silent_renew_url = 'https://localhost:4200/silent-renew.html';
            config.log_console_debug_active = true;

            //config.start_checksession = true;
            //config.post_login_route = '/home';
            //config.forbidden_route = '/home';
            //config.unauthorized_route = '/home';
            //config.max_id_token_iat_offset_allowed_in_seconds = 5;
            //config.history_cleanup_off = true;

            const authWellKnownEndpoints = new AuthWellKnownEndpoints();
            authWellKnownEndpoints.setWellKnownEndpoints(this.oidcConfigService.wellKnownEndpoints);

            this.oidcSecurityService.setupModule(config, authWellKnownEndpoints);
        });
    }
github lydemann / oidc-angular-identityserver / Solution 6 - OIDC and Angular client / ClientNgApp / ClientApp2 / src / app / core / auth / auth.service.ts View on Github external
) {
        const openIdImplicitFlowConfiguration = new OpenIDImplicitFlowConfiguration();
        openIdImplicitFlowConfiguration.stsServer = authUrl,
        openIdImplicitFlowConfiguration.redirect_url = originUrl + 'callback',
        openIdImplicitFlowConfiguration.client_id = 'spaClient';
        openIdImplicitFlowConfiguration.response_type = 'id_token token';
        openIdImplicitFlowConfiguration.scope = 'openid profile resourceApi';
        openIdImplicitFlowConfiguration.post_logout_redirect_uri = originUrl;
        openIdImplicitFlowConfiguration.forbidden_route = '/forbidden';
        openIdImplicitFlowConfiguration.unauthorized_route = '/unauthorized';
        openIdImplicitFlowConfiguration.auto_userinfo = true;
        openIdImplicitFlowConfiguration.log_console_warning_active = true;
        openIdImplicitFlowConfiguration.log_console_debug_active = true;
        openIdImplicitFlowConfiguration.max_id_token_iat_offset_allowed_in_seconds = 10;

        const authWellKnownEndpoints = new AuthWellKnownEndpoints();
        authWellKnownEndpoints.issuer = authUrl;

        authWellKnownEndpoints.jwks_uri = authUrl + '/.well-known/openid-configuration/jwks';
        authWellKnownEndpoints.authorization_endpoint = authUrl + '/connect/authorize';
        authWellKnownEndpoints.token_endpoint = authUrl + '/connect/token';
        authWellKnownEndpoints.userinfo_endpoint = authUrl + '/connect/userinfo';
        authWellKnownEndpoints.end_session_endpoint = authUrl + '/connect/endsession';
        authWellKnownEndpoints.check_session_iframe = authUrl + '/connect/checksession';
        authWellKnownEndpoints.revocation_endpoint = authUrl + '/connect/revocation';
        authWellKnownEndpoints.introspection_endpoint = authUrl + '/connect/introspect';
        authWellKnownEndpoints.introspection_endpoint = authUrl + '/connect/introspect';

        this.oidcSecurityService.setupModule(openIdImplicitFlowConfiguration, authWellKnownEndpoints);

        if (this.oidcSecurityService.moduleSetup) {
            this.doCallbackLogicIfRequired();