You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/identityserver/configuration/index.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,10 +18,11 @@ The Configuration API is a collection of endpoints that allow for management and
18
18
implementation. The Configuration API can be hosted either separately or within the IdentityServer implementation, and is
19
19
distributed through the separate [Duende.IdentityServer.Configuration NuGet package](https://www.nuget.org/packages/Duende.IdentityServer.Configuration).
20
20
21
-
Currently, the Configuration API supports the [Dynamic Client Registration](/identityserver/configuration/dcr.mdx) protocol.
21
+
Currently, the Configuration API supports the [Dynamic Client Registration](/identityserver/configuration/dcr.mdx) protocol.
22
22
23
-
The Configuration API is part of the [Duende IdentityServer](https://duendesoftware.com/products/identityserver) Business Edition or higher. The same [license](https://duendesoftware.com/products/identityserver#pricing)
24
-
and [special offers](https://duendesoftware.com/specialoffers) apply.
23
+
:::note
24
+
This feature is part of the [Duende IdentityServer Business and Enterprise Edition](https://duendesoftware.com/products/identityserver).
25
+
:::
25
26
26
27
The Configuration API source code is available [on GitHub](https://github.com/DuendeSoftware/products/tree/main/identity-server/src/Configuration).
Copy file name to clipboardExpand all lines: src/content/docs/identityserver/overview/specs.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,10 @@ redirect_from:
13
13
14
14
Duende IdentityServer implements the following specifications:
15
15
16
+
:::note
17
+
Some specifications are only available in the [Duende IdentityServer Business or Enterprise Edition](https://duendesoftware.com/products/identityserver).
Copy file name to clipboardExpand all lines: src/content/docs/identityserver/tokens/pop.md
+24-16Lines changed: 24 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ redirect_from:
20
20
21
21
By default, OAuth access tokens are so-called `bearer` tokens. This means they are not bound to a client and anybody who possesses the token can use it. The security concern here is that a leaked token could be used by a (malicious) third party to impersonate the client and/or user.
22
22
23
-
On the other hand, `Proof-of-Possession` (PoP) tokens are bound to the client that requested the token. This is also often called sender constraining. This is done by using cryptography to prove that the sender of the token knows an additional secret only known to the client.
23
+
On the other hand, `Proof-of-Possession` (PoP) tokens are bound to the client that requested the token. This is also often called sender constraining. This is done by using cryptography to prove that the sender of the token knows an additional secret only known to the client.
24
24
25
25
This proof is called the *confirmation method* and is expressed via the standard [`cnf` claim](https://tools.ietf.org/html/rfc7800),e.g.:
26
26
@@ -45,13 +45,14 @@ When using reference tokens, the cnf claim will be returned from the introspecti
45
45
IdentityServer supports two styles of proof of possession tokens: **Mutual TLS** and **DPoP**.
46
46
47
47
## Mutual TLS
48
+
48
49
[RFC 8705](https://tools.ietf.org/html/rfc8705) specifies how to bind a TLS client certificate to an access token. With this method your IdentityServer will embed the SHA-256 thumbprint of the X.509 client certificate into the access token via the cnf claim, e.g.:
@@ -68,6 +69,7 @@ It is not mandatory to authenticate your clients with a client certificate to ge
68
69
In this scenario, the client would create an X.509 certificate on the fly, and use that to establish the TLS channel to your IdentityServer. As long as the certificate is accepted by your web server, your IdentityServer can embed the `cnf` claim, and your APIs can validate it.
69
70
70
71
#### .NET Client
72
+
71
73
In .NET it is straight-forward to create an X.509 certificate on the fly and use it to open a TLS connection.
Copy file name to clipboardExpand all lines: src/content/docs/identityserver/troubleshooting/index.mdx
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -304,9 +304,13 @@ When dealing with external authentication, you may want to implement `OnTicketRe
304
304
305
305
### Use Server-side Sessions
306
306
307
-
If you have a Business Edition or higher license for IdentityServer, then you can use [server-side sessions][2] to store the
307
+
You can use [server-side sessions][2] to store the
308
308
user's session data in a data store instead of in the cookie. This will greatly reduce the size of the cookie while allowing you to store more data in the session.
309
309
310
+
:::note
311
+
This feature is part of the [Duende IdentityServer Business and Enterprise Edition](https://duendesoftware.com/products/identityserver).
312
+
:::
313
+
310
314
### Implement a Custom `ITicketStore` to Reduce Cookie Size
311
315
312
316
When configuring the cookie authentication handler, you can provide a custom `ITicketStore` implementation to store the
0 commit comments