Skip to content

Commit 820c1aa

Browse files
Refine documentation for clarity and consistency
Updated links, clarified terminology, and improved formatting for better readability. Adjusted code and text references to align with standard conventions and enhance user understanding.
1 parent 1f259d8 commit 820c1aa

File tree

2 files changed

+10
-9
lines changed

2 files changed

+10
-9
lines changed

src/content/docs/identitymodel/endpoints/dynamic-registration.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ redirect_from:
99
---
1010

1111
The client library for [OpenID Connect Dynamic Client Registration](https://openid.net/specs/openid-connect-registration-1_0.html)
12-
is provided as an extension method for *HttpClient*.
12+
is provided as an extension method for [
13+
`System.Net.Http.HttpClient`](https://learn.microsoft.com/en-us/dotnet/api/system.net.http.httpclient).
1314

1415
The following code sends a registration request:
1516

src/content/docs/identityserver/ui/login/dynamicproviders.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ redirect_from:
1010
---
1111

1212
Dynamic Identity Providers are a scalable solution for managing authentication with lots of external providers, without
13-
incurring performance penalties or requiring application recompilation. This feature, included in the Enterprise Edition
13+
incurring performance penalties or requiring application recompilation. This feature, included in the [Enterprise Edition](/general/licensing/#enterprise-edition)
1414
of Duende IdentityServer, enables providers to be configured dynamically from a store at runtime.
1515

1616
## Dynamic Identity Providers
@@ -76,7 +76,7 @@ builder.Services
7676
The identity provider store only provides an interface to query dynamic providers and does not provide any methods to add, update, or delete identity providers.
7777
For custom store implementations, this means you'll need to implement a mechanism for populating the store with identity providers.
7878

79-
If you're using the Entity Provider Core stored from the `Duende.IdentityServer.EntityFramework.Storage` NuGet package,
79+
If you're using the Entity Framework Core identity provider store from the `Duende.IdentityServer.EntityFramework.Storage` NuGet package,
8080
you can use the `ConfigurationDbContext` database context directly to add, update or remove dynamic identity providers:
8181

8282
```csharp title="SeedData.cs"
@@ -183,12 +183,12 @@ There are three paths that are set on the `OpenIdConnectOptions`:
183183
* [RemoteSignOutPath](https://docs.microsoft.com/en-us/dotnet/api/microsoft.aspnetcore.authentication.openidconnect.openidconnectoptions.remotesignoutpath).
184184
This is the OIDC front channel logout URI protocol value. The suffix `"/signout"` is used for this path.
185185

186-
For your IdentityServer running at "https://sample.duendesoftware.com" and an OIDC identity provider whose
186+
For your IdentityServer running at `https://sample.duendesoftware.com` and an OIDC identity provider whose
187187
scheme is "idp1", your client configuration with the external OIDC identity provider would be:
188188

189-
* The redirect URI would be "https://sample.duendesoftware.com/federation/idp1/signin"
190-
* The post logout redirect URI would be "https://sample.duendesoftware.com/federation/idp1/signout-callback"
191-
* The front channel logout URI would be "https://sample.duendesoftware.com/federation/idp1/signout"
189+
* The redirect URI would be `https://sample.duendesoftware.com/federation/idp1/signin`
190+
* The post logout redirect URI would be `https://sample.duendesoftware.com/federation/idp1/signout-callback`
191+
* The front channel logout URI would be `https://sample.duendesoftware.com/federation/idp1/signout`
192192

193193

194194
## Advanced Configuration
@@ -411,9 +411,9 @@ Google authentication handler, a similar implementation detail may exist for the
411411
builder.Services.ConfigureOptions<OAuthPostConfigureOptions<GoogleOptions, GoogleHandler>>();
412412
```
413413

414-
### 4. Use Your Custom IdentityProvider
414+
### 4. Use A Custom IdentityProvider
415415

416-
With these building blocks in place, you can start using your custom identity provider type with Duende IdentityServer
416+
With these building blocks in place, you can start using a custom identity provider type with Duende IdentityServer
417417
dynamic identity providers!
418418

419419
```csharp title="Program.cs"

0 commit comments

Comments
 (0)