Skip to content

Commit e77d8e7

Browse files
committed
Clarified that external IDP sign-out is typically front-channel based
1 parent 1c50717 commit e77d8e7

1 file changed

Lines changed: 8 additions & 2 deletions

File tree

src/content/docs/identityserver/ui/logout/external-notification.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,12 @@ out" page.
2222
IdentityServer must then notify all of its clients (as discussed [here](/identityserver/ui/logout)), also typically in the form of a
2323
request in an `<iframe>` from within the external identity provider's `<iframe>`.
2424

25+
:::note
26+
To configure federated sign-out from an external identity provider, please refer to the documentation for your specific
27+
external identity provider. When using an OpenID Connect identity provider, this is typically configured using the
28+
front-channel logout URI.
29+
:::
30+
2531
What makes federated sign-out a special case (when compared to a normal [logout](/identityserver/ui/logout)) is that the federated
2632
sign-out request is not to the normal sign-out endpoint in IdentityServer.
2733
In fact, each external IdentityProvider will have a different endpoint into your IdentityServer host.
@@ -36,7 +42,7 @@ federated sign-out.
3642

3743
Fortunately IdentityServer already contains this code.
3844
When requests come into IdentityServer and invoke the handlers for external authentication providers, IdentityServer
39-
detects if these are federated signout requests and if they are it will automatically render the same `<iframe>`
45+
detects if these are federated sign-out requests and if they are it will automatically render the same `<iframe>`
4046
as [described here for logout](/identityserver/ui/logout).
4147

42-
In short, federated signout is automatically supported.
48+
In short, federated sign-out is automatically supported.

0 commit comments

Comments
 (0)