Skip to content

Commit db9ef4a

Browse files
authored
remove superfluous </div> and reformat (#554)
1 parent 6290497 commit db9ef4a

File tree

1 file changed

+119
-119
lines changed

1 file changed

+119
-119
lines changed

_pages/oidc/authorization.md

Lines changed: 119 additions & 119 deletions
Original file line numberDiff line numberDiff line change
@@ -86,149 +86,149 @@ In an **unsuccessful authorization**, the URI will contain the parameters `error
8686
<div class="grid-row grid-gap">
8787
<div class="desktop:grid-col-9 mobile:grid-col-full">
8888
<h2 id="authorization" class="margin-top-neg-1">Authorization</h2>
89-
<p>
90-
The authorization endpoint handles authentication and authorization of a user.
91-
To present the Login.gov authorization page to a user, direct them to the
92-
<code class="language-plaintext highlighter-rouge">/openid_connect/authorize</code>. View an example for <strong>private_key_jwt</strong> or <strong>PKCE</strong> in the side panel.
93-
</p>
94-
<h3 class="margin-top-4" id="request-parameters">Request Parameters</h3>
95-
<ul class="doc-sub-nav">
96-
<li id="jwt-nav" class="doc-sub-nav-item code-button__selected margin-left-neg-3">
97-
<a href="{% link _pages/oidc/authorization.md %}#authorization">JWT</a>
98-
</li>
99-
<li id="pkce-nav" class="doc-sub-nav-item margin-left-3">
100-
<a href="{% link _pages/oidc/authorization/pkce.md %}#authorization">PKCE</a>
101-
</li>
102-
</ul>
103-
<div class="grid-row dev-doc-row">
104-
<div class="grid-col-5">
105-
<h4 id="acr_values">acr_values</h4>
106-
</div>
107-
<div class="grid-col-7">
108-
<p>
109-
The Authentication Context Class Reference requests can be used to specify the type of service level or the AAL (Authentication Assurance Level) for the user. These and the <code class="language-plaintext highlighter-rouge">scope</code> determine which <a class="usa-link" href="{{ '/attributes/' | prepend: site.baseurl }}">user attributes</a> will be available in the <a class="usa-link" href="{{ '/oidc/user-info/#user-info-response' | prepend: site.baseurl }}">user info response</a>.
110-
</p>
111-
<p>
112-
Multiple values can be joined with a space (before being URI-escaped in the final URL).
113-
</p>
114-
</div>
89+
<p>
90+
The authorization endpoint handles authentication and authorization of a user.
91+
To present the Login.gov authorization page to a user, direct them to the
92+
<code class="language-plaintext highlighter-rouge">/openid_connect/authorize</code>. View an example for <strong>private_key_jwt</strong> or <strong>PKCE</strong> in the side panel.
93+
</p>
94+
<h3 class="margin-top-4" id="request-parameters">Request Parameters</h3>
95+
<ul class="doc-sub-nav">
96+
<li id="jwt-nav" class="doc-sub-nav-item code-button__selected margin-left-neg-3">
97+
<a href="{% link _pages/oidc/authorization.md %}#authorization">JWT</a>
98+
</li>
99+
<li id="pkce-nav" class="doc-sub-nav-item margin-left-3">
100+
<a href="{% link _pages/oidc/authorization/pkce.md %}#authorization">PKCE</a>
101+
</li>
102+
</ul>
103+
<div class="grid-row dev-doc-row">
104+
<div class="grid-col-5">
105+
<h4 id="acr_values">acr_values</h4>
115106
</div>
116-
<div class="grid-row dev-doc-row">
117-
<dl class="usa-accordion">
118-
{% include accordion.html content=service_levels accordion_id="service_level_accordion" title="Type of Service Level" id="service_level" %}
119-
{% include accordion.html content=aal_values accordion_id="aal_accordion" title="Authentication Assurance (AAL) Values" id="aal_values" %}
120-
{% include accordion.html content=deprecated_values accordion_id="deprecated_accordion" title="Deprecated Service Values" id="deprecated_values" %}
121-
</dl>
107+
<div class="grid-col-7">
108+
<p>
109+
The Authentication Context Class Reference requests can be used to specify the type of service level or the AAL (Authentication Assurance Level) for the user. These and the <code class="language-plaintext highlighter-rouge">scope</code> determine which <a class="usa-link" href="{{ '/attributes/' | prepend: site.baseurl }}">user attributes</a> will be available in the <a class="usa-link" href="{{ '/oidc/user-info/#user-info-response' | prepend: site.baseurl }}">user info response</a>.
110+
</p>
111+
<p>
112+
Multiple values can be joined with a space (before being URI-escaped in the final URL).
113+
</p>
114+
</div>
115+
</div>
116+
<div class="grid-row dev-doc-row">
117+
<dl class="usa-accordion">
118+
{% include accordion.html content=service_levels accordion_id="service_level_accordion" title="Type of Service Level" id="service_level" %}
119+
{% include accordion.html content=aal_values accordion_id="aal_accordion" title="Authentication Assurance (AAL) Values" id="aal_values" %}
120+
{% include accordion.html content=deprecated_values accordion_id="deprecated_accordion" title="Deprecated Service Values" id="deprecated_values" %}
121+
</dl>
122+
</div>
123+
<div class="grid-row dev-doc-row">
124+
<div class="grid-col-5">
125+
<h4>client_id</h4>
126+
</div>
127+
<div class="grid-col-7">
128+
<p>Also known as the issuer, this is the unique identifier for the client. This will be registered with the Login.gov IdP in advance.</p>
129+
</div>
130+
</div>
131+
<div class="grid-row dev-doc-row">
132+
<div class="grid-col-5">
133+
<h4 id="prompt">prompt</h4>
134+
</div>
135+
<div class="grid-col-7">
136+
<p>This must be <code class="language-plaintext highlighter-rouge">select_account</code></p>
122137
</div>
123-
<div class="grid-row dev-doc-row">
138+
</div>
139+
<div class="grid-row dev-doc-row">
140+
<div class="grid-col-5">
141+
<h4 class="clearfix">response_type</h4>
142+
</div>
143+
<div class="grid-col-7">
144+
<p>This must be <code class="language-plaintext highlighter-rouge">code</code></p>
145+
</div>
146+
</div>
147+
<div class="grid-row dev-doc-row">
148+
<div class="grid-col-5">
149+
<h4 class="clearfix">redirect_uri</h4>
150+
</div>
151+
<div class="grid-col-7">
152+
<p>The URI Login.gov will redirect to after a successful authorization.</p>
153+
</div>
154+
</div>
155+
<div class="dev-doc-row">
156+
<div class="grid-row">
124157
<div class="grid-col-5">
125-
<h4>client_id</h4>
158+
<h4 class="clearfix">scope</h4>
126159
</div>
127160
<div class="grid-col-7">
128-
<p>Also known as the issuer, this is the unique identifier for the client. This will be registered with the Login.gov IdP in advance.</p>
161+
<p>A space-separated string of the scopes being requested. (Keep in mind the blank space “ “ should be encoded with “+”.) The authorization page will display the list of attributes being requested from the user. Applications should aim to request the fewest <a class="usa-link" href="{{ '/attributes/' | prepend: site.baseurl }}">user attributes</a> and smallest scope needed.</p>
162+
<p>OIDC requests MUST contain the <code>openid</code> scope value.</p>
129163
</div>
130164
</div>
131-
<div class="grid-row dev-doc-row">
165+
<div class="grid-row">
166+
<dl class="usa-accordion padding-top-2">
167+
{% include accordion.html content=scope_possible_values accordion_id="scope_accordion" id="scope_possible_values" title="Possible Values" %}
168+
</dl>
169+
</div>
170+
</div>
171+
<div class="dev-doc-row">
172+
<div class="grid-row">
132173
<div class="grid-col-5">
133-
<h4 id="prompt">prompt</h4>
174+
<h4 class="clearfix">state</h4>
134175
</div>
135176
<div class="grid-col-7">
136-
<p>This must be <code class="language-plaintext highlighter-rouge">select_account</code></p>
177+
<p>A unique value, at least 22 characters in length, used for maintaining state between the request and the callback. This value will be returned to the client on a successful authorization.</p>
137178
</div>
138179
</div>
139-
<div class="grid-row dev-doc-row">
180+
</div>
181+
<div class="dev-doc-row">
182+
<div class="grid-row">
140183
<div class="grid-col-5">
141-
<h4 class="clearfix">response_type</h4>
184+
<h4 class="clearfix">nonce</h4>
142185
</div>
143186
<div class="grid-col-7">
144-
<p>This must be <code class="language-plaintext highlighter-rouge">code</code></p>
187+
<p>A unique value, at least 22 characters in length, used to verify the integrity
188+
of the <code class="language-plaintext highlighter-rouge">id_token</code> and mitigate
189+
<a class="usa-link usa-link usa-link--external" href="https://en.wikipedia.org/wiki/Replay_attack">replay attacks</a>.</p>
190+
<p>This value should include per-session state and be unguessable by attackers. This value will be present in the
191+
<code class="language-plaintext highlighter-rouge">id_token</code> of the <a class="usa-link" href="{{ '/oidc/token/#token-response' | prepend: site.baseurl }}">token endpoint response</a>,
192+
where clients will verify that the nonce claim value is equal to the value of the nonce parameter sent in the authentication request.</p>
193+
<p> Read more about <a class="usa-link usa-link--external" href="https://openid.net/specs/openid-connect-core-1_0.html#NonceNotes">nonce implementation</a> in the spec.</p>
145194
</div>
146195
</div>
147-
<div class="grid-row dev-doc-row">
196+
</div>
197+
<div class="dev-doc-row">
198+
<div class="grid-row">
148199
<div class="grid-col-5">
149-
<h4 class="clearfix">redirect_uri</h4>
200+
<h4 class="clearfix">locale</h4><span class="float-left text-italic">optional</span>
150201
</div>
151202
<div class="grid-col-7">
152-
<p>The URI Login.gov will redirect to after a successful authorization.</p>
153-
</div>
154-
</div>
155-
<div class="dev-doc-row">
156-
<div class="grid-row">
157-
<div class="grid-col-5">
158-
<h4 class="clearfix">scope</h4>
159-
</div>
160-
<div class="grid-col-7">
161-
<p>A space-separated string of the scopes being requested. (Keep in mind the blank space “ “ should be encoded with “+”.) The authorization page will display the list of attributes being requested from the user. Applications should aim to request the fewest <a class="usa-link" href="{{ '/attributes/' | prepend: site.baseurl }}">user attributes</a> and smallest scope needed.</p>
162-
<p>OIDC requests MUST contain the <code>openid</code> scope value.</p>
163-
</div>
164-
</div>
165-
<div class="grid-row">
166-
<dl class="usa-accordion padding-top-2">
167-
{% include accordion.html content=scope_possible_values accordion_id="scope_accordion" id="scope_possible_values" title="Possible Values" %}
168-
</dl>
169-
</div>
170-
</div>
171-
<div class="dev-doc-row">
172-
<div class="grid-row">
173-
<div class="grid-col-5">
174-
<h4 class="clearfix">state</h4>
175-
</div>
176-
<div class="grid-col-7">
177-
<p>A unique value, at least 22 characters in length, used for maintaining state between the request and the callback. This value will be returned to the client on a successful authorization.</p>
178-
</div>
203+
<p>If you know that a user would prefer one of our alternative language translations (currently Spanish or French), you can include the <code class="language-plaintext highlighter-rouge">locale</code> parameter to specify the language Login.gov should use (either <code class="text-lowercase">ES</code> for Spanish or <code class="text-lowercase">FR</code> for French).</p>
179204
</div>
180205
</div>
181-
<div class="dev-doc-row">
182-
<div class="grid-row">
183-
<div class="grid-col-5">
184-
<h4 class="clearfix">nonce</h4>
185-
</div>
186-
<div class="grid-col-7">
187-
<p>A unique value, at least 22 characters in length, used to verify the integrity
188-
of the <code class="language-plaintext highlighter-rouge">id_token</code> and mitigate
189-
<a class="usa-link usa-link usa-link--external" href="https://en.wikipedia.org/wiki/Replay_attack">replay attacks</a>.</p>
190-
<p>This value should include per-session state and be unguessable by attackers. This value will be present in the
191-
<code class="language-plaintext highlighter-rouge">id_token</code> of the <a class="usa-link" href="{{ '/oidc/token/#token-response' | prepend: site.baseurl }}">token endpoint response</a>,
192-
where clients will verify that the nonce claim value is equal to the value of the nonce parameter sent in the authentication request.</p>
193-
<p> Read more about <a class="usa-link usa-link--external" href="https://openid.net/specs/openid-connect-core-1_0.html#NonceNotes">nonce implementation</a> in the spec.</p>
194-
</div>
195-
</div>
196-
</div>
197-
<div class="dev-doc-row">
198-
<div class="grid-row">
199-
<div class="grid-col-5">
200-
<h4 class="clearfix">locale</h4><span class="float-left text-italic">optional</span>
201-
</div>
202-
<div class="grid-col-7">
203-
<p>If you know that a user would prefer one of our alternative language translations (currently Spanish or French), you can include the <code class="language-plaintext highlighter-rouge">locale</code> parameter to specify the language Login.gov should use (either <code class="text-lowercase">ES</code> for Spanish or <code class="text-lowercase">FR</code> for French).</p>
204-
</div>
205-
</div>
206-
</div>
207-
</div>
208-
<div class="usa-layout-docs__main code-snippet-column desktop:grid-col-3">
209-
<section id="jwt" class="code-snippet-section">
210-
<span class="code-button code-button__selected margin-left-2">JWT Request</span>
211-
{% include snippets/oidc/auth/jwt.md %}
212-
</section>
213206
</div>
214207
</div>
215-
<div class="grid-row grid-gap">
216-
<div class="desktop:grid-col-9 mobile:grid-col-full">
217-
{{ authorization_response | markdownify }}
218-
<a href="{{ '/oidc/token/' | prepend: site.baseurl }}" class="usa-link margin-top-4 mobile:display-none desktop:display-block">Next step: Token</a>
219-
</div>
220-
<div class="usa-layout-docs__main code-snippet-column desktop:grid-col-3">
221-
<div class="margin-top-2 position-relative z-index-1">
222-
<button id="oidc_auth_tab1_button" data-selector="oidc_auth" class="code-button code-button__selected margin-left-2">Success</button>
223-
<button id="oidc_auth_tab2_button" data-selector="oidc_auth" class="code-button margin-left-2">Error</button>
224-
<section id="oidc_auth_tab1">
225-
{% include snippets/oidc/auth/success.md %}
226-
</section>
227-
<section id="oidc_auth_tab2" hidden>
228-
{% include snippets/oidc/auth/failure.md %}
229-
</section>
230-
</div>
208+
<div class="usa-layout-docs__main code-snippet-column desktop:grid-col-3">
209+
<section id="jwt" class="code-snippet-section">
210+
<span class="code-button code-button__selected margin-left-2">JWT Request</span>
211+
{% include snippets/oidc/auth/jwt.md %}
212+
</section>
213+
</div>
214+
</div>
215+
216+
<div class="grid-row grid-gap">
217+
<div class="desktop:grid-col-9 mobile:grid-col-full">
218+
{{ authorization_response | markdownify }}
219+
<a href="{{ '/oidc/token/' | prepend: site.baseurl }}" class="usa-link margin-top-4 mobile:display-none desktop:display-block">Next step: Token</a>
220+
</div>
221+
<div class="usa-layout-docs__main code-snippet-column desktop:grid-col-3">
222+
<div class="margin-top-2 position-relative z-index-1">
223+
<button id="oidc_auth_tab1_button" data-selector="oidc_auth" class="code-button code-button__selected margin-left-2">Success</button>
224+
<button id="oidc_auth_tab2_button" data-selector="oidc_auth" class="code-button margin-left-2">Error</button>
225+
<section id="oidc_auth_tab1">
226+
{% include snippets/oidc/auth/success.md %}
227+
</section>
228+
<section id="oidc_auth_tab2" hidden>
229+
{% include snippets/oidc/auth/failure.md %}
230+
</section>
231231
</div>
232-
<a href="{{ '/oidc/token/' | prepend: site.baseurl }}" class="usa-link mobile:display-block desktop:display-none margin-top-2">Next step: Token</a>
233232
</div>
233+
<a href="{{ '/oidc/token/' | prepend: site.baseurl }}" class="usa-link mobile:display-block desktop:display-none margin-top-2">Next step: Token</a>
234234
</div>

0 commit comments

Comments
 (0)