You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/accesstokenmanagement/blazor-server.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ Once registered and initialized, `Duende.AccessTokenManagement` will keep the st
71
71
72
72
If you've registered your token store with `AddBlazorServerAccessTokenManagement`, Duende.AccessTokenManagement will register the services necessary to attach tokens to outgoing HTTP requests automatically, using the same API as a non-blazor application. You inject an HTTP client factory and resolve named HTTP clients where ever you need to make HTTP requests, and you register the HTTP client's that use access tokens in the ASP.NET Core service provider with our extension method:
Copy file name to clipboardExpand all lines: src/content/docs/bff/diagnostics/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ To start emitting OpenTelemetry data in Duende Backend for Frontend (BFF), you n
35
35
36
36
The following configuration adds the OpenTelemetry configuration to your service setup, and exports data to an [OTLP exporter](https://learn.microsoft.com/en-us/dotnet/core/diagnostics/observability-with-otel):
Copy file name to clipboardExpand all lines: src/content/docs/identityserver/apis/aspnetcore/authorization.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ The access token will include additional claims that can be used for authorizati
15
15
16
16
In ASP.NET core, the contents of the JWT payload get transformed into claims and packaged up in a `ClaimsPrincipal`. So you can always write custom validation or authorization logic in C#:
17
17
18
-
```cs
18
+
```csharp
19
19
publicIActionResultGet()
20
20
{
21
21
varisAllowed=User.HasClaim("scope", "read");
@@ -28,7 +28,7 @@ For better encapsulation and re-use, consider using the ASP.NET Core [authorizat
28
28
29
29
With this approach, you would first turn the claim requirement(s) into a named policy:
@@ -73,7 +73,7 @@ Historically, Duende IdentityServer emitted the `scope` claims as an array in th
73
73
74
74
The newer *JWT Profile for OAuth*[spec](/identityserver/overview/specs.md) mandates that the scope claim is a single space delimited string. You can switch the format by setting the `EmitScopesAsSpaceDelimitedStringInJwt` on the [options](/identityserver/reference/options.md). But this means that the code consuming access tokens might need to be adjusted. The following code can do a conversion to the *multiple claims* format that .NET prefers:
0 commit comments