Skip to content

Commit 5a473d4

Browse files
Merge pull request #675 from DuendeSoftware/update-overview-pngs-to-svg
Switch images from PNG to SVG versions
2 parents aaea788 + 5afdc43 commit 5a473d4

17 files changed

Lines changed: 952 additions & 11 deletions

File tree

src/content/docs/identityserver/fundamentals/users.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ It is very important that you understand how it works when building the login pa
4848
Recall the diagram showing the relationship of your custom UI pages and the IdentityServer middleware in your
4949
IdentityServer host application:
5050

51-
![middleware diagram](../overview/images/middleware.png)
51+
![middleware diagram](../overview/images/middleware.svg)
5252

5353
When your IdentityServer receives an authorize request, it will inspect it for a current authentication session for a
5454
user. This authentication session is based on ASP.NET Core's authentication system and is ultimately determined by a
@@ -58,7 +58,7 @@ If the user has never logged in there will be no cookie, and then the request to
5858
redirect to your login page. This is the entry point into your custom workflow that can take over to get the user logged
5959
in.
6060

61-
![sign in flow](../ui/images/signin_flow.png)
61+
![sign in flow](../ui/images/signin_flow.svg)
6262

6363
Once the login page has finished logging in the user with the ASP.NET Core authentication system, it will redirect the
6464
user back to the authorize endpoint.

src/content/docs/identityserver/overview/big-picture.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ redirect_from:
1212

1313
Most modern applications look more or less like this:
1414

15-
![an architecture diagram for modern applications with clients and services](./images/appArch.png)
15+
![an architecture diagram for modern applications with clients and services](./images/application-architecture.svg)
1616

1717
The most common interactions are:
1818

@@ -31,7 +31,7 @@ across those applications and endpoints.
3131

3232
Restructuring the application to support a security token service leads to the following architecture and protocols:
3333

34-
![an architecture diagram showing where OAuth 2.0 is used](./images/protocols.png)
34+
![an architecture diagram showing where OAuth 2.0 is used](./images/protocols.svg)
3535

3636
Such a design divides security concerns into two parts:
3737

@@ -78,7 +78,7 @@ depending on your needs)
7878
and add the IdentityServer middleware to that application. The middleware adds the necessary protocol heads to the
7979
application so that clients can talk to it using those standard protocols.
8080

81-
![IdentityServer middleware diagram and its relatinship in the ASP.NET Core pipeline](./images/middleware.png)
81+
![IdentityServer middleware diagram and its relatinship in the ASP.NET Core pipeline](./images/middleware.svg)
8282

8383
The hosting application can be as complex as you want, but we typically recommend to keep the attack surface as small as
8484
possible by including

src/content/docs/identityserver/overview/images/application-architecture.svg

Lines changed: 97 additions & 0 deletions
Loading

src/content/docs/identityserver/overview/images/middleware.svg

Lines changed: 69 additions & 0 deletions
Loading

src/content/docs/identityserver/overview/images/protocols.svg

Lines changed: 164 additions & 0 deletions
Loading

src/content/docs/identityserver/overview/images/terminology.svg

Lines changed: 67 additions & 0 deletions
Loading

src/content/docs/identityserver/overview/terminology.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ redirect_from:
1212

1313
The specs, documentation and object model use a certain terminology that you should be aware of.
1414

15-
![a basic diagrams showing the relationship between users, clients, identityserver, and resources](./images/terminology.png)
15+
![a basic diagrams showing the relationship between users, clients, identityserver, and resources](./images/terminology.svg)
1616

1717
## Duende IdentityServer
1818

src/content/docs/identityserver/ui/ciba.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ A nice feature of this workflow is that the user does not enter their credential
3030

3131
Below is a diagram that shows the high level steps involved with the CIBA workflow and the supporting services involved.
3232

33-
![Showing how CIBA works in diagram form](./images/ciba.png)
33+
![Showing how CIBA works in diagram form](./images/ciba.svg)
3434

3535

3636
* **Step 1**: IdentityServer exposes a [backchannel authentication request endpoint](/identityserver/reference/endpoints/ciba) that the client uses to initiate the CIBA workflow.

src/content/docs/identityserver/ui/federation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Federation means that your IdentityServer offers authentication methods that use
1515
If you offer a number of these external authentication methods, often the term *Federation Gateway* is used to describe
1616
this architectural approach.
1717

18-
![Diagram showing the benefits of using a federation gateway](./images/federation.png)
18+
![Diagram showing the benefits of using a federation gateway](./images/federation.svg)
1919

2020
Generally, this architecture allows shielding your client applications from the complexities of your authentication
2121
workflows and business requirements that go along with them.

src/content/docs/identityserver/ui/images/ciba.svg

Lines changed: 129 additions & 0 deletions
Loading

0 commit comments

Comments
 (0)