oidc
Here are 668 public repositories matching this topic...
Description 📓
Middleware is calling getToken directly without providing any decode methods. By getToken() uses jwtDecrypt from jose package, and it will probably throws error when the JWT is not signed in the same way. It will throw error when we p
-
Updated
Apr 6, 2022 - Go
-
Updated
Apr 6, 2022 - Python
-
Updated
Apr 4, 2022 - Python
-
Updated
Apr 4, 2022 - JavaScript
-
Updated
Apr 7, 2022 - Python
-
Updated
Apr 4, 2022 - JavaScript
-
Updated
Apr 4, 2022 - Rust
-
Updated
Apr 3, 2022 - Go
Describe the bug
If the environment (in my case the stage environment) is not setup as a a secure origin the library break up cause of the crypto library is not in window object
To Reproduce
Steps to reproduce the behavior:
- A server work on http that is setup as 'insecure origin'
- Start the login sequence
Expected behavior
Warning on library loading that check secure or
-
Updated
Apr 6, 2022 - C
-
Updated
Apr 6, 2022 - C#
-
Updated
Mar 15, 2022 - TypeScript
-
Updated
Apr 2, 2022 - JavaScript
Describe the issue:
The links not show hover states on hover on the getting started page.
How to reproduce:
- Navigate to getting started page
- hover over any link
Expected behavior:
Should indicate hover state for links
-
Updated
Apr 7, 2022 - Java
-
Updated
Apr 7, 2022 - Ruby
After creating a custom login policy, the active identity providers are still listed from default. Same ist for MFA and 2FA, ...
From the screenshots below, you can see that the new policy is loaded after creation and reset. But only the policy itself and not the identity providers and factors:
.
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit