mirror of
https://gitee.com/dcren/openiddict-documentation.git
synced 2025-07-15 14:04:34 +08:00
Update the documentation pages
This commit is contained in:
parent
8263d95312
commit
4edb932430
@ -283,9 +283,8 @@ if (await manager.FindByClientIdAsync("console") is null)
|
|||||||
options.IgnoreScopePermissions();
|
options.IgnoreScopePermissions();
|
||||||
});
|
});
|
||||||
</code></pre><h2 id="response-type-permissions">Response type permissions</h2>
|
</code></pre><h2 id="response-type-permissions">Response type permissions</h2>
|
||||||
<p>-> [!NOTE]</p>
|
<p>-> [!NOTE]
|
||||||
<blockquote><p>Response type permissions were introduced in OpenIddict 3.0.</p>
|
-> Response type permissions were introduced in OpenIddict 3.0.</p>
|
||||||
</blockquote>
|
|
||||||
<h3 id="definition-3">Definition</h3>
|
<h3 id="definition-3">Definition</h3>
|
||||||
<p>Response type permissions limit the response types a client application is allowed to use when implementing an interactive flow like code, implicit or hybrid.</p>
|
<p>Response type permissions limit the response types a client application is allowed to use when implementing an interactive flow like code, implicit or hybrid.</p>
|
||||||
<h3 id="supported-permissions-3">Supported permissions</h3>
|
<h3 id="supported-permissions-3">Supported permissions</h3>
|
||||||
|
@ -171,29 +171,29 @@ Here's an example for the client credentials grant, used in machine-to-machi
|
|||||||
// to replace the default OpenIddict entities.
|
// to replace the default OpenIddict entities.
|
||||||
options.UseOpenIddict();
|
options.UseOpenIddict();
|
||||||
});
|
});
|
||||||
</code></pre></li>
|
</code></pre><p>-> [!WARNING]
|
||||||
</ul>
|
-> Important: if you change the default entity primary key (e.g. to <code>int</code> or <code>Guid</code> instead of <code>string</code>), make sure you use the <code>options.ReplaceDefaultEntities<TKey>()</code>
|
||||||
<p>-> [!WARNING]</p>
|
-> core extension accepting a <code>TKey</code> generic argument and use the generic <code>options.UseOpenIddict<TKey>()</code> overload to configure EF Core to use the specified type:
|
||||||
<blockquote><p>Important: if you change the default entity primary key (e.g. to <code>int</code> or <code>Guid</code> instead of <code>string</code>), make sure you use the <code>options.ReplaceDefaultEntities<TKey>()</code>
|
->
|
||||||
core extension accepting a <code>TKey</code> generic argument and use the generic <code>options.UseOpenIddict<TKey>()</code> overload to configure Entity Framework Core to use the specified key type:</p>
|
-> <code>csharp
|
||||||
<pre><code class="lang-csharp">services.AddOpenIddict()
|
-> services.AddOpenIddict()
|
||||||
.AddCore(options =>
|
-> .AddCore(options =>
|
||||||
{
|
-> {
|
||||||
// Configure OpenIddict to use the default entities with a custom key type.
|
-> // Configure OpenIddict to use the default entities with a custom key type.
|
||||||
options.UseEntityFrameworkCore()
|
-> options.UseEntityFrameworkCore()
|
||||||
.UseDbContext<ApplicationDbContext>()
|
-> .UseDbContext<ApplicationDbContext>()
|
||||||
.ReplaceDefaultEntities<Guid>();
|
-> .ReplaceDefaultEntities<Guid>();
|
||||||
});
|
-> });
|
||||||
|
->
|
||||||
services.AddDbContext<ApplicationDbContext>(options =>
|
-> services.AddDbContext<ApplicationDbContext>(options =>
|
||||||
{
|
-> {
|
||||||
// Configure the context to use Microsoft SQL Server.
|
-> // Configure the context to use Microsoft SQL Server.
|
||||||
options.UseSqlServer(configuration["Data:DefaultConnection:ConnectionString"]);
|
-> options.UseSqlServer(configuration["Data:DefaultConnection:ConnectionString"]);
|
||||||
|
->
|
||||||
options.UseOpenIddict<Guid>();
|
-> options.UseOpenIddict<Guid>();
|
||||||
});
|
-> });
|
||||||
</code></pre></blockquote>
|
-></code></p>
|
||||||
<ul>
|
</li>
|
||||||
<li><p><strong>Create your own authorization controller:</strong>
|
<li><p><strong>Create your own authorization controller:</strong>
|
||||||
Implementing a custom authorization controller is required to allow OpenIddict to create tokens based on the identities and claims you provide.
|
Implementing a custom authorization controller is required to allow OpenIddict to create tokens based on the identities and claims you provide.
|
||||||
Here's an example for the client credentials grant:</p>
|
Here's an example for the client credentials grant:</p>
|
||||||
|
@ -9,7 +9,7 @@
|
|||||||
"output": {
|
"output": {
|
||||||
".html": {
|
".html": {
|
||||||
"relative_path": "configuration/application-permissions.html",
|
"relative_path": "configuration/application-permissions.html",
|
||||||
"hash": "bn2oc9vnYnRCNd31rO4mnw=="
|
"hash": "T82L6dl/gd6zRNmoTwudtw=="
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"is_incremental": false,
|
"is_incremental": false,
|
||||||
@ -45,7 +45,7 @@
|
|||||||
"output": {
|
"output": {
|
||||||
".html": {
|
".html": {
|
||||||
"relative_path": "guide/getting-started.html",
|
"relative_path": "guide/getting-started.html",
|
||||||
"hash": "EubGbQd6qMqQ/UD3oj2WIw=="
|
"hash": "G5Z0qYgQEEbzw1G+VpiRHg=="
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"is_incremental": false,
|
"is_incremental": false,
|
||||||
|
Loading…
Reference in New Issue
Block a user