You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/source/DeveloperGuide/OAuth2Authorization/index.rst
+22-7Lines changed: 22 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ An OAuth 2.0 flow has the following `roles <https://datatracker.ietf.org/doc/htm
32
32
33
33
- **Resource Owner** - Entity that can grant access to a protected resource. In the context of DIRAC, these are DIRAC users.
34
34
- **Resource Server** - Server hosting the protected resources. In the context of DIRAC, this is DIRAC backend components like a DIRAC services.
35
-
- **Client** - Application requesting access to a protected resource on behalf of the *Resource Owner*. In the context of DIRAC, these are DIRAC client installations.
35
+
- **Client** - Application requesting access to a protected resource on behalf of the *Resource Owner*. In the context of DIRAC, these are DIRAC client installations. The client may also be a DIRAC component, such as a service or agent, that uses a user access token to access DIRAC services.
36
36
- **Authorization Server** - Server that authenticates the *Resource Owner* and issues access tokens after getting proper authorization. In the context of DIRAC, this is DIRAC Authorization Server.
37
37
38
38
OAuth 2.0 grants
@@ -178,10 +178,10 @@ Using the local certificate ``dirac-login`` makes a similar algorithm as :ref:`d
178
178
#) If the connection was successful, a command generate a proxy certificate with the required extensions.
179
179
#) A proxy certificate without extensions upload to :py:class:`~DIRAC.FrameworkSystem.DB.ProxyDB.ProxyDB` using :py:class:`~DIRAC.FrameworkSystem.Service.ProxyManagerHandler.ProxyManagerHandler`.
180
180
181
-
Using ``dirac-login my_group --use-diracas --proxy``:
181
+
Using ``dirac-login my_group --use-diracas --token``:
:alt:DIRAC CLI login DIRAC AS flow and obtaining an access token.
219
+
:alt:DIRAC CLI login DIRAC AS flow and obtaining a proxy.
220
220
221
221
In this case, the process differs only in that when the user successfully completes the browser flow path, DIRAC AS responds with a proxy:
222
222
11) Upon receipt of a request for a proxy, DIRAC AS requests :py:class:`~DIRAC.FrameworkSystem.Service.ProxyManagerHandler.ProxyManagerHandler` to provide a proxy to the requested user and group.
If it is a long session, ie with a refresh token, which allows you to update the access token and thus continue the working session, then to end the session it is necessary to revoke refresh token:
251
+
1) :ref:`dirac-logout` sends a revoke request to DIRAC AS.
252
+
253
+
a) DIRAC AS decrypts the refresh token and reads to whom it belongs.
254
+
#) DIRAC AS makes a revoke request to the appropriate IdP.
255
+
#) DIRAC AS remove record about this refresh token in ``AuthDB`` database.
0 commit comments