You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
:alt:OAuth 2.0 roles in context of the DIRAC components interation.
33
+
:alt:OAuth 2.0 roles in context of the DIRAC components interation (source https://github.com/TaykYoku/DIRACIMGS/raw/main/OAuth2_Roles_ServiceAsClient.ai)
34
34
35
35
As shown in the figure, DIRAC server components, such as service or agent, may have sufficient privileges to request a user access token (or proxy). Upon receiving it, the component can access the protected resource on behalf of the user.
36
36
@@ -81,7 +81,7 @@ This component is based on the popular `authlib <https://docs.authlib.org/en/lat
81
81
The necessary components for DIRAC Authorization Server to work are collected in a :py:mod:`~DIRAC.FrameworkSystem.private.authorization` subpackage.
:alt:DIRAC CLI login DIRAC AS flow and obtaining an access token.
198
+
:alt:DIRAC CLI login DIRAC AS flow and obtaining an access token (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
199
199
200
200
User do not need to have a locally installed certificate if logging in through DIRAC AS.
201
201
@@ -226,7 +226,7 @@ User do not need to have a locally installed certificate if logging in through D
226
226
Using ``dirac-login my_group --use-diracas --proxy``:
:alt:DIRAC CLI login DIRAC AS flow and obtaining a proxy.
229
+
:alt:DIRAC CLI login DIRAC AS flow and obtaining a proxy (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
230
230
231
231
In this case, the process differs only in that when the user successfully completes the browser flow path, DIRAC AS responds with a proxy:
232
232
11) Upon receipt of a request for a proxy, DIRAC AS requests :py:class:`~DIRAC.FrameworkSystem.Service.ProxyManagerHandler.ProxyManagerHandler` to provide a proxy to the requested user and group.
If it is a long session, i.e. with a refresh token, which allows you to update the access token and thus continue the working session, then to end the session it is necessary to revoke the refresh token:
269
269
1) :ref:`dirac-logout` sends a revoke request to DIRAC AS.
:alt:DIRAC web logout flow (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
284
284
285
285
The web server receives a request from the user's browser to end the session and made revoke refresh token request to DIRAC AS. After that cleans cookies.
0 commit comments