Skip to content

Commit 49d2c0c

Browse files
committed
fix: fix anchors
fix anchors
1 parent a40f30b commit 49d2c0c

File tree

6 files changed

+25
-25
lines changed

6 files changed

+25
-25
lines changed

docs/developers/signing-keys.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar_position: 5
77

88
# Signing keys
99

10-
Logto [OIDC signing keys](https://auth.wiki/signing-key), as known as "OIDC private keys" and "OIDC cookie keys", are the signing keys used to sign JWTs ([access tokens](https://auth.wiki/access-token) and [ID tokens](https://auth.wiki/id-token)) and browser cookies in Logto [sign-in sessions](/end-user-flows/sign-out#sign-in-session). These signing keys are generated when seeding Logto database ([open-source](/logto-oss)) or creating a new tenant ([Cloud](/logto-cloud)) and can be managed through [CLI](/logto-oss/using-cli) (open-source), Management APIs or Console UI.
10+
Logto [OIDC signing keys](https://auth.wiki/signing-key), as known as "OIDC private keys" and "OIDC cookie keys", are the signing keys used to sign JWTs ([access tokens](https://auth.wiki/access-token) and [ID tokens](https://auth.wiki/id-token)) and browser cookies in Logto [sign-in sessions](/end-user-flows/sign-out#what-is-a-logto-session). These signing keys are generated when seeding Logto database ([open-source](/logto-oss)) or creating a new tenant ([Cloud](/logto-cloud)) and can be managed through [CLI](/logto-oss/using-cli) (open-source), Management APIs or Console UI.
1111

1212
By default, Logto uses the elliptic curve (EC) algorithm to generate digital signatures. However, considering that users often need to verify JWT signatures and many older tools do not support the EC algorithm (only supporting RSA), we have implemented the functionality to rotate private keys and allow users to choose the signature algorithm (including both RSA and EC). This ensures compatibility with services that use outdated signature verification tools.
1313

docs/end-user-flows/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ End-user flows cover all verification processes for user interactions, categoriz
2121
| [Magic link (One-time token)](/end-user-flows/one-time-token) | <ul><li>Organization member invitation</li><li>User invitation when registration is disabled</li><li>Sign in or sign up using magic link</li></ul> |
2222
| Authorize third-party apps | <ul><li>[Consent screen for OIDC / OAuth apps](/end-user-flows/consent-screen)</li></ul> |
2323
| Collect user profile | <ul><li>[Collect additional user data during sign-up](/end-user-flows/collect-user-profile)</li></ul> |
24-
| [Sign-out](/end-user-flows/sign-out) | <ul><li>[Clear tokens and local session at the client side](/end-user-flows/sign-out/#clear-tokens-and-local-session-at-the-client-side)</li><li>[Clear sign-in session at Logto](/end-user-flows/sign-out/#clear-sign-in-session-at-logto)</li><li>[Federated sign-out: Back-channel logout](/end-user-flows/sign-out/#federated-sign-out-back-channel-logout)</li></ul> |
24+
| [Sign-out](/end-user-flows/sign-out) | <ul><li>[Clear tokens and local session at the client side](/end-user-flows/sign-out/#1-client-side-only-sign-out)</li><li>[Clear sign-in session at Logto](/end-user-flows/sign-out/#2-end-session-at-logto-global-sign-out-in-current-logto-implementation)</li><li>[Federated sign-out: Back-channel logout](/end-user-flows/sign-out/#federated-sign-out-back-channel-logout)</li></ul> |
2525

2626
This section introduces Logto’s pre-built UI for a streamlined sign-in experience, helping you accelerate time-to-market. For more flexibility in customizing your sign-in UI, try the “[Bring Your UI](/customization/bring-your-ui)” feature with Logto Experience APIs.
2727

docs/end-user-flows/account-settings/by-account-api.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -670,7 +670,7 @@ The response body would be like:
670670
- `code`: the backup code.
671671
- `usedAt`: the timestamp when the code was used, `null` if not used yet.
672672

673-
### Manage user sessions
673+
### Manage user sessions \{#manage-user-sessions}
674674

675675
**List active sessions**
676676

docs/end-user-flows/sign-out.mdx

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -11,25 +11,25 @@ Sign-out in Logto (as an OIDC identity provider) involves both:
1111

1212
To understand sign-out behavior, it helps to separate these two layers and then see how **grants** connect them.
1313

14-
## Core concepts
14+
## Core concepts \{#core-concepts}
1515

16-
### What is a Logto session?
16+
### What is a Logto session? \{#what-is-a-logto-session}
1717

1818
A Logto session is the centralized sign-in state managed by Logto. It is created after successful authentication and represented by cookies under the Logto domain.
1919

2020
If the session cookie is valid, the user can be silently authenticated (SSO) across multiple apps that trust the same Logto tenant.
2121

2222
If no valid session exists, Logto shows the sign-in page.
2323

24-
### What are grants?
24+
### What are grants? \{#what-are-grants}
2525

2626
A **grant** represents the authorization status for a specific user + client application combination.
2727

2828
- One Logto session can have grants for multiple client apps.
2929
- A grant is what issued tokens are associated with.
3030
- In this doc set, use **grant** as the cross-app authorization unit.
3131

32-
### How session, grants, and client auth status relate
32+
### How session, grants, and client auth status relate \{#how-session-grants-and-client-auth-status-relate}
3333

3434
```mermaid
3535
flowchart LR
@@ -57,7 +57,7 @@ flowchart LR
5757
- **Client local session/tokens** control whether each app currently treats user as signed in.
5858
- **Grants** connect these two worlds by representing app-specific authorization state.
5959

60-
## Sign-in recap (why sign-out is multi-layered)
60+
## Sign-in recap (why sign-out is multi-layered) \{#sign-in-recap-why-sign-out-is-multi-layered}
6161

6262
```mermaid
6363
sequenceDiagram
@@ -84,9 +84,9 @@ sequenceDiagram
8484
OIDC -->> Client: Return tokens
8585
```
8686

87-
## Session topology across apps/devices
87+
## Session topology across apps/devices \{#session-topology-across-apps-devices}
8888

89-
### Shared session cookie (same browser/user agent)
89+
### Shared session cookie (same browser/user agent) \{#shared-session-cookie-same-browser-user-agent}
9090

9191
If a user signs in to multiple apps from the same browser, those apps can reuse the same Logto session cookie and SSO behavior applies.
9292

@@ -114,7 +114,7 @@ flowchart TD
114114
D -->|Create session| C
115115
```
116116

117-
### Isolated session cookies (different devices/browsers)
117+
### Isolated session cookies (different devices/browsers) \{#isolated-session-cookies-different-devices-browsers}
118118

119119
Different browsers/devices hold different Logto cookies, so sign-in session state is isolated.
120120

@@ -151,16 +151,16 @@ flowchart TD
151151
F -->|Create session| E
152152
```
153153

154-
## Sign-out mechanisms
154+
## Sign-out mechanisms \{#sign-out-mechanisms}
155155

156-
### 1) Client-side-only sign-out
156+
### 1) Client-side-only sign-out \{#1-client-side-only-sign-out}
157157

158158
Client app clears its own local session and tokens (ID/access/refresh tokens). This signs user out from that app's local state only.
159159

160160
- Logto session may still be active.
161161
- Other apps under same Logto session may still SSO.
162162

163-
### 2) End-session at Logto (global sign-out in current Logto implementation)
163+
### 2) End-session at Logto (global sign-out in current Logto implementation) \{#2-end-session-at-logto-global-sign-out-in-current-logto-implementation}
164164

165165
To clear centralized Logto session, app redirects user to the end session endpoint, for example:
166166

@@ -174,7 +174,7 @@ In current Logto SDK behavior:
174174

175175
As a result, current SDK sign-out is treated as **global sign-out**.
176176

177-
### What happens during global sign-out
177+
### What happens during global sign-out \{#what-happens-during-global-sign-out}
178178

179179
```mermaid
180180
flowchart TD
@@ -194,13 +194,13 @@ During global sign-out:
194194
- If `offline_access` **is** granted, grants are not revoked by end-session.
195195
- For `offline_access` cases, refresh tokens and grants remain valid until grant expiration.
196196

197-
## Grant lifetime and `offline_access` impact
197+
## Grant lifetime and `offline_access` impact \{#grant-lifetime-and-offline-access-impact}
198198

199199
- Default Logto grant TTL is **180 days**.
200200
- If `offline_access` is granted, end-session does not revoke that app grant by default.
201201
- Refresh token chain associated with that grant can continue until the grant expires (or is explicitly revoked).
202202

203-
## Federated sign-out: back-channel logout
203+
## Federated sign-out: back-channel logout \{#federated-sign-out-back-channel-logout}
204204

205205
For cross-app consistency, Logto supports [back-channel logout](https://openid.net/specs/openid-connect-backchannel-1_0-final.html).
206206

@@ -214,7 +214,7 @@ Typical flow:
214214
2. Logto processes end-session and sends logout token(s) to registered back-channel logout URI(s).
215215
3. Each app validates logout token and clears its own local session/tokens.
216216

217-
## Sign-out methods in Logto SDKs
217+
## Sign-out methods in Logto SDKs \{#sign-out-methods-in-logto-sdks}
218218

219219
- **SPA and web**: `client.signOut()` clears local token storage and redirects to Logto end-session endpoint. You may provide a post-logout redirect URI.
220220
- **Native (including React Native / Flutter)**: usually clears local token storage only. Sessionless webview means no persistent Logto browser cookie to clear.
@@ -223,7 +223,7 @@ Typical flow:
223223
For native applications that does not support sessionless webview or does not recognize the `emphasized` settings(Android app using **React Native** or **Flutter** SDK), you may force the user prompt to sign in again by passing the `prompt=login` parameter in the authorization request.
224224
:::
225225

226-
## Enforce re-authentication on every access
226+
## Enforce re-authentication on every access \{#enforce-re-authentication-on-every-access}
227227

228228
For high-security actions, include `prompt=login` in auth requests to bypass SSO and force credential entry each time.
229229

@@ -235,12 +235,12 @@ Typical combined setting:
235235
prompt=login consent
236236
```
237237

238-
## FAQs
238+
## FAQs \{#faqs}
239239

240240
<details>
241241
<summary>
242242

243-
### I'm not receiving the back-channel logout notifications.
243+
### I'm not receiving the back-channel logout notifications. \{#im-not-receiving-the-back-channel-logout-notifications}
244244

245245
</summary>
246246

@@ -249,7 +249,7 @@ prompt=login consent
249249

250250
</details>
251251

252-
## Related resources
252+
## Related resources \{#related-resources}
253253

254254
<Url href="https://blog.logto.io/oidc-back-channel-logout/">
255255
Understanding OIDC back-channel logout.

docs/quick-starts/fragments/_scope-claim-list.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Here's the list of supported scopes and the corresponding claims:
22

3-
### Standard OIDC scopes
3+
### Standard OIDC scopes {#standard-oidc-scopes}
44

55
**`openid`** (default)
66

@@ -46,7 +46,7 @@ Please refer to the [OpenID Connect Core 1.0](https://openid.net/specs/openid-co
4646
Scopes marked with **(default)** are always requested by the Logto SDK. Claims under standard OIDC scopes are always included in the ID token when the corresponding scope is requested — they cannot be turned off.
4747
:::
4848

49-
### Extended scopes
49+
### Extended scopes {#extended-scopes}
5050

5151
The following scopes are extended by Logto and will return claims through the [userinfo endpoint](https://openid.net/specs/openid-connect-core-1_0.html#UserInfo). These claims can also be configured to be included directly in the ID token through <CloudLink to="/customize-jwt">Console > Custom JWT</CloudLink>. See [Custom ID token](/developers/custom-id-token) for more details.
5252

docs/user-management/manage-users.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ After you reset the password, copy and send it to the end-user. Once the "Reset
8989

9090
You cannot set a specific password for users in the Logto Console, but you can use the [Management API](/integrate-logto/interact-with-management-api) `PATCH /api/users/{userId}/password` to specify a password.
9191

92-
### Manage user active sessions
92+
### Manage user active sessions \{#manage-user-active-sessions}
9393

9494
On the "User details" page, navigate to the "Session details" page by clicking on the "Manage" button of a specific session. Here you can view detailed information about the session, such as the device, location, and login time. If you want to log out the user from this session, simply click the "Revoke session" button at the right top corner, and the session will be immediately revoked.
9595

0 commit comments

Comments
 (0)