You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Application privileges to be requested from the authorization server. The value should be in plain text and will be properly URI encoded for authorization.
433
+
When using OpenID Connect Implicit Flow, value <code>openid</code> must be included.
The issuer of the id_token. It must exactly match the <code>iss</code> claim (if exists) in the id_token
503
+
</td>
504
+
</tr>
505
+
<tr>
506
+
<tdclass="parameter">
507
+
<span>subject</span>
508
+
<spanclass="info">(optional)</span>
509
+
</td>
510
+
<td>
511
+
For OpenID Connect Implicit Flow only.
512
+
The subject of the id_token. The detailed meaning is usually application specific.
513
+
It must exactly match the <code>sub</code> claim (if exists) in the id_token
514
+
</td>
515
+
</tr>
516
+
<tr>
517
+
<tdclass="parameter">
518
+
<span>pub-key</span>
519
+
<spanclass="info">(optional)</span>
520
+
</td>
521
+
<td>
522
+
For OpenID Connect Implicit Flow only.
523
+
The public key to verify the id_token signature. It could be <code>.pem</code> format or JWK format.<br>
524
+
For signing algorithm (usually specified by <code>alg</code> in the id_token header), currently only <code>RS256</code>, <code>RS384</code>, or <code>RS512</code> is supported.<br>
525
+
If not set, then the id_token itself should carry the public key, or the url which can be used to retrieve the public key.
0 commit comments