diff --git a/_pages/oidc/authorization.md b/_pages/oidc/authorization.md index 13fafefb..215cf04c 100644 --- a/_pages/oidc/authorization.md +++ b/_pages/oidc/authorization.md @@ -86,149 +86,149 @@ In an **unsuccessful authorization**, the URI will contain the parameters `error
- The authorization endpoint handles authentication and authorization of a user.
- To present the Login.gov authorization page to a user, direct them to the
- /openid_connect/authorize. View an example for private_key_jwt or PKCE in the side panel.
-
- The Authentication Context Class Reference requests can be used to specify the type of service level or the AAL (Authentication Assurance Level) for the user. These and the scope determine which user attributes will be available in the user info response.
-
- Multiple values can be joined with a space (before being URI-escaped in the final URL). -
-
+ The authorization endpoint handles authentication and authorization of a user.
+ To present the Login.gov authorization page to a user, direct them to the
+ /openid_connect/authorize. View an example for private_key_jwt or PKCE in the side panel.
+
+ The Authentication Context Class Reference requests can be used to specify the type of service level or the AAL (Authentication Assurance Level) for the user. These and the scope determine which user attributes will be available in the user info response.
+
+ Multiple values can be joined with a space (before being URI-escaped in the final URL). +
+Also known as the issuer, this is the unique identifier for the client. This will be registered with the Login.gov IdP in advance.
+This must be select_account
This must be code
The URI Login.gov will redirect to after a successful authorization.
+Also known as the issuer, this is the unique identifier for the client. This will be registered with the Login.gov IdP in advance.
+A space-separated string of the scopes being requested. (Keep in mind the blank space “ “ should be encoded with “+”.) The authorization page will display the list of attributes being requested from the user. Applications should aim to request the fewest user attributes and smallest scope needed.
+OIDC requests MUST contain the openid scope value.
This must be select_account
A unique value, at least 22 characters in length, used for maintaining state between the request and the callback. This value will be returned to the client on a successful authorization.
This must be code
A unique value, at least 22 characters in length, used to verify the integrity
+ of the id_token and mitigate
+ replay attacks.
This value should include per-session state and be unguessable by attackers. This value will be present in the
+ id_token of the token endpoint response,
+ where clients will verify that the nonce claim value is equal to the value of the nonce parameter sent in the authentication request.
Read more about nonce implementation in the spec.
The URI Login.gov will redirect to after a successful authorization.
-A space-separated string of the scopes being requested. (Keep in mind the blank space “ “ should be encoded with “+”.) The authorization page will display the list of attributes being requested from the user. Applications should aim to request the fewest user attributes and smallest scope needed.
-OIDC requests MUST contain the openid scope value.
A unique value, at least 22 characters in length, used for maintaining state between the request and the callback. This value will be returned to the client on a successful authorization.
-If you know that a user would prefer one of our alternative language translations (currently Spanish or French), you can include the locale parameter to specify the language Login.gov should use (either ES for Spanish or FR for French).
A unique value, at least 22 characters in length, used to verify the integrity
- of the id_token and mitigate
- replay attacks.
This value should include per-session state and be unguessable by attackers. This value will be present in the
- id_token of the token endpoint response,
- where clients will verify that the nonce claim value is equal to the value of the nonce parameter sent in the authentication request.
Read more about nonce implementation in the spec.
-If you know that a user would prefer one of our alternative language translations (currently Spanish or French), you can include the locale parameter to specify the language Login.gov should use (either ES for Spanish or FR for French).