Skip to content

Commit 37899bd

Browse files
committed
change/add Microsoft Entra ID to Azure AD references; renamed Wiki page
Signed-off-by: Hans Zandbelt <[email protected]>
1 parent 59781b2 commit 37899bd

File tree

5 files changed

+6
-7
lines changed

5 files changed

+6
-7
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ For details on configuring multiple providers see the [Wiki](https://github.com/
136136
See the [Wiki](https://github.com/OpenIDC/mod_auth_openidc/wiki) for configuration docs for other OpenID Connect Providers:
137137
- [GLUU Server](https://github.com/OpenIDC/mod_auth_openidc/wiki/Gluu-Server)
138138
- [Keycloak](https://github.com/OpenIDC/mod_auth_openidc/wiki/Keycloak)
139-
- [Azure AD](https://github.com/OpenIDC/mod_auth_openidc/wiki/Azure-Active-Directory-Authentication)
139+
- [Microsoft Entra ID (Azure AD)](https://github.com/OpenIDC/mod_auth_openidc/wiki/Microsoft-Entra-ID---Azure-AD)
140140
- [Sign in with Apple](https://github.com/OpenIDC/mod_auth_openidc/wiki/Sign-in-with-Apple)
141141
- [Curity Identity Server](https://github.com/OpenIDC/mod_auth_openidc/wiki/Curity-Identity-Server)
142142
- [LemonLDAP::NG](https://github.com/OpenIDC/mod_auth_openidc/wiki/LemonLDAP::NG)

auth_openidc.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@
189189
#OIDCCABundlePath <path>
190190

191191
# Require configured issuer to match the issuer returned in id_token.
192-
# (Disable to support Azure AD multi-tenant applications.)
192+
# (Disable to support Microsoft Entra ID / Azure AD multi-tenant applications.)
193193
# When not defined, the default value is "On".
194194
#OIDCValidateIssuer [On|Off]
195195

src/handle/logout.c

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -224,9 +224,8 @@ int oidc_logout_request(request_rec *r, oidc_cfg_t *c, oidc_session_t *session,
224224
provider = oidc_get_provider_for_issuer(r, c, iss, FALSE);
225225
} else {
226226
/*
227-
* Azure AD seems to such a non spec compliant provider.
228-
* In this case try our luck with the static config if
229-
* possible.
227+
* Microsoft Entra ID / Azure AD seems to such a non spec compliant provider.
228+
* In this case try our luck with the static config if possible.
230229
*/
231230
oidc_debug(r, "OP did not provide an iss as parameter");
232231
if (oidc_provider_static_config(r, c, &provider) == FALSE)

src/proto/auth.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ static apr_byte_t oidc_proto_endpoint_auth_private_key_jwt(request_rec *r, oidc_
200200
jwk_pub =
201201
oidc_util_key_list_first(oidc_cfg_public_keys_get(cfg), CJOSE_JWK_KTY_RSA, OIDC_JOSE_JWK_SIG_STR);
202202
if (jwk_pub && jwk_pub->x5t)
203-
// populate x5t; at least required for Azure AD
203+
// populate x5t; at least required for Microsoft Entra ID / Azure AD
204204
jwt->header.x5t = apr_pstrdup(r->pool, jwk_pub->x5t);
205205
}
206206

src/proto/token.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ apr_byte_t oidc_proto_token_endpoint_request(request_rec *r, oidc_cfg_t *cfg, oi
188188
*expires_in = -1;
189189
j_expires_in = json_object_get(j_result, OIDC_PROTO_EXPIRES_IN);
190190
if (j_expires_in != NULL) {
191-
/* cater for string values (old Azure AD) */
191+
/* cater for string values (old Microsoft Entra ID / Azure AD) */
192192
if (json_is_string(j_expires_in))
193193
*expires_in = _oidc_str_to_int(json_string_value(j_expires_in), -1);
194194
else if (json_is_integer(j_expires_in))

0 commit comments

Comments
 (0)