Skip to content

Commit

Permalink
document introspect.token_param_name and json_payload_claim for >=2.1.0
Browse files Browse the repository at this point in the history
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
  • Loading branch information
zandbelt committed Sep 16, 2024
1 parent 0ec4aeb commit 1f8cc8e
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion oauth2.conf
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@
#
# <type> <value> <description> <options> (provided in query-encoded format)
#
# introspect <url> RFC7662 introspection URL introspect.ssl_verify, introspect.auth, introspect.cache, introspect.expiry, introspect.params, type
# introspect <url> RFC7662 introspection URL introspect.ssl_verify, introspect.auth, introspect.cache, introspect.expiry, introspect.token_param_name, introspect.params, type
# jwks_uri <url> JWKS URI that serves the public keys jwks_uri.ssl_verify, jwks_uri.cache, jwks_uri.expiry, type,
# verify.iss, verify.exp, verify.iat, verify.iat.slack_before, verify.iat.slack_after
# jwk <json> JWK JSON representation of a symmetric kid (overrides kid in JWK), verify.iss, verify.exp, verify.iat, type,
Expand Down Expand Up @@ -111,6 +111,7 @@
# default is "default", otherwise must refer to a named cache defined with OAuth2Cache
# expiry <number> cache expiry in seconds for access token validation results
# introspect.auth <auth> endpoint authentication, see Authentication Options
# introspect.token_param_name <string> name of the parameter in which the access token is sent, if is not the default "token"
# introspect.params <form-encoded-string> form-encoded extra POST parameters sent to the introspectoin endpoint e.g. key1%3Done%26key2%3Dtwo
# *.ssl_verify true|false verify the TLS certificate presented on the configured HTTPs URL
# *.cache <string> cache backend name for results resolved from a URI
Expand Down Expand Up @@ -160,5 +161,6 @@
# authn_header <name> (-) set remote user in authentication header <name>
# prefix <string> (OAUTH2_CLAIM_) append prefix to claim names (in headers/envvars)
# remote_user_claim <name> (sub) obtain remote user from claim <name>
# json_payload_claim <name> (-) set the JSON payload in header/envar <prefix><name>

#OAuth2TargetPass <options-in-query-encoded-format>

0 comments on commit 1f8cc8e

Please sign in to comment.