Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

remove 6689 content from V23.0.0.6 #6801

Merged
merged 3 commits into from
Jul 28, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ The following examples demonstrate configuration options for the OpenID Connect
- <<#jwe,Accept tokens in JWE format>>
- <<#third,Configure a third-party OpenID Connect provider>>
- <<#filter,Support Multiple OpenID Connect Providers>>
- <<#privatekey,Use Private Key JWT for client authentication>>
// - <<#privatekey,Use Private Key JWT for client authentication>>
- <<#ltpa,Disable LTPA cookies>>
- <<#oauth,Accept an OAuth 2.0 bearer access token without redirecting to an OpenID Connect provider>>
- <<#context,Modify the context root>>
Expand Down Expand Up @@ -284,6 +284,9 @@ In the following example, authentication requests that contain the `/mywebapp/me

For more information, see xref:ROOT:authentication-filters.adoc[Authentication filters].

////

removed from 23.0.0.6-7
[#privatekey]
=== Use Private Key JWT for client authentication

Expand All @@ -305,6 +308,8 @@ The `tokenEndpointAuthSigningAlgorithm` attribute specifies the signing algorith

For more information on `private_key_jwt` client authentication, see the https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication[OpenID Connect core specification] and https://datatracker.ietf.org/doc/html/rfc7523[RFC 7523].

////

[#ltpa]
=== Disable LTPA cookies

Expand Down
6 changes: 5 additions & 1 deletion modules/reference/pages/feature/socialLogin/examples.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ The following examples show how to configure different scenarios in the `server.
- <<#loginwithasocialmediaid,Request login with a social media ID or with their account for the configured registry>>
- <<#loginforsubset,Request login with a social media ID for only a subset of applications, URLs, browsers, or IP addresses>>
- <<#loginsasoptions,Provide other social media logins as options to the user>>
- <<#privatekeyjwt,Use Private Key JWT for client authentication>>
// - <<#privatekeyjwt,Use Private Key JWT for client authentication>>
- <<#openshiftservice,Use OpenShift service accounts to authenticate and authorize protected resource requests>>
- <<#activedirectory,Use Active Directory as an authentication provider>>

Expand Down Expand Up @@ -144,6 +144,8 @@ The following example configures Instagram as the social media provider.
</oauth2Login>
----

////

[#privatekeyjwt]
=== Use Private Key JWT for client authentication

Expand All @@ -161,6 +163,8 @@ The following example shows how to use a private key JWT for client authenticati
/>
----

////

[#openshiftservice]
=== Use OpenShift service accounts to authenticate and authorize protected resource requests

Expand Down