You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/developers/signing-keys.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ sidebar_position: 5
7
7
8
8
# Signing keys
9
9
10
-
Logto [OIDC signing keys](https://auth.wiki/signing-key), as known as "OIDC private keys" and "OIDC cookie keys", are the signing keys used to sign JWTs ([access tokens](https://auth.wiki/access-token) and [ID tokens](https://auth.wiki/id-token)) and browser cookies in Logto [sign-in sessions](/end-user-flows/sign-out#sign-in-session). These signing keys are generated when seeding Logto database ([open-source](/logto-oss)) or creating a new tenant ([Cloud](/logto-cloud)) and can be managed through [CLI](/logto-oss/using-cli) (open-source), Management APIs or Console UI.
10
+
Logto [OIDC signing keys](https://auth.wiki/signing-key), as known as "OIDC private keys" and "OIDC cookie keys", are the signing keys used to sign JWTs ([access tokens](https://auth.wiki/access-token) and [ID tokens](https://auth.wiki/id-token)) and browser cookies in Logto [sign-in sessions](/end-user-flows/sign-out#what-is-a-logto-session). These signing keys are generated when seeding Logto database ([open-source](/logto-oss)) or creating a new tenant ([Cloud](/logto-cloud)) and can be managed through [CLI](/logto-oss/using-cli) (open-source), Management APIs or Console UI.
11
11
12
12
By default, Logto uses the elliptic curve (EC) algorithm to generate digital signatures. However, considering that users often need to verify JWT signatures and many older tools do not support the EC algorithm (only supporting RSA), we have implemented the functionality to rotate private keys and allow users to choose the signature algorithm (including both RSA and EC). This ensures compatibility with services that use outdated signature verification tools.
Copy file name to clipboardExpand all lines: docs/end-user-flows/README.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ End-user flows cover all verification processes for user interactions, categoriz
21
21
|[Magic link (One-time token)](/end-user-flows/one-time-token)| <ul><li>Organization member invitation</li><li>User invitation when registration is disabled</li><li>Sign in or sign up using magic link</li></ul> |
| Collect user profile | <ul><li>[Collect additional user data during sign-up](/end-user-flows/collect-user-profile)</li></ul> |
24
-
|[Sign-out](/end-user-flows/sign-out)| <ul><li>[Clear tokens and local session at the client side](/end-user-flows/sign-out/#clear-tokens-and-local-session-at-the-client-side)</li><li>[Clear sign-in session at Logto](/end-user-flows/sign-out/#clear-sign-in-session-at-logto)</li><li>[Federated sign-out: Back-channel logout](/end-user-flows/sign-out/#federated-sign-out-back-channel-logout)</li></ul>|
24
+
|[Sign-out](/end-user-flows/sign-out)| <ul><li>[Clear tokens and local session at the client side](/end-user-flows/sign-out/#1-client-side-only-sign-out)</li><li>[Clear sign-in session at Logto](/end-user-flows/sign-out/#2-end-session-at-logto-global-sign-out-in-current-logto-implementation)</li><li>[Federated sign-out: Back-channel logout](/end-user-flows/sign-out/#federated-sign-out-back-channel-logout)</li></ul> |
25
25
26
26
This section introduces Logto’s pre-built UI for a streamlined sign-in experience, helping you accelerate time-to-market. For more flexibility in customizing your sign-in UI, try the “[Bring Your UI](/customization/bring-your-ui)” feature with Logto Experience APIs.
Copy file name to clipboardExpand all lines: docs/end-user-flows/sign-out.mdx
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,25 +11,25 @@ Sign-out in Logto (as an OIDC identity provider) involves both:
11
11
12
12
To understand sign-out behavior, it helps to separate these two layers and then see how **grants** connect them.
13
13
14
-
## Core concepts
14
+
## Core concepts\{#core-concepts}
15
15
16
-
### What is a Logto session?
16
+
### What is a Logto session?\{#what-is-a-logto-session}
17
17
18
18
A Logto session is the centralized sign-in state managed by Logto. It is created after successful authentication and represented by cookies under the Logto domain.
19
19
20
20
If the session cookie is valid, the user can be silently authenticated (SSO) across multiple apps that trust the same Logto tenant.
21
21
22
22
If no valid session exists, Logto shows the sign-in page.
23
23
24
-
### What are grants?
24
+
### What are grants?\{#what-are-grants}
25
25
26
26
A **grant** represents the authorization status for a specific user + client application combination.
27
27
28
28
- One Logto session can have grants for multiple client apps.
29
29
- A grant is what issued tokens are associated with.
30
30
- In this doc set, use **grant** as the cross-app authorization unit.
31
31
32
-
### How session, grants, and client auth status relate
32
+
### How session, grants, and client auth status relate\{#how-session-grants-and-client-auth-status-relate}
33
33
34
34
```mermaid
35
35
flowchart LR
@@ -57,7 +57,7 @@ flowchart LR
57
57
-**Client local session/tokens** control whether each app currently treats user as signed in.
58
58
-**Grants** connect these two worlds by representing app-specific authorization state.
59
59
60
-
## Sign-in recap (why sign-out is multi-layered)
60
+
## Sign-in recap (why sign-out is multi-layered)\{#sign-in-recap-why-sign-out-is-multi-layered}
61
61
62
62
```mermaid
63
63
sequenceDiagram
@@ -84,9 +84,9 @@ sequenceDiagram
84
84
OIDC -->> Client: Return tokens
85
85
```
86
86
87
-
## Session topology across apps/devices
87
+
## Session topology across apps/devices\{#session-topology-across-apps-devices}
Client app clears its own local session and tokens (ID/access/refresh tokens). This signs user out from that app's local state only.
159
159
160
160
- Logto session may still be active.
161
161
- Other apps under same Logto session may still SSO.
162
162
163
-
### 2) End-session at Logto (global sign-out in current Logto implementation)
163
+
### 2) End-session at Logto (global sign-out in current Logto implementation)\{#2-end-session-at-logto-global-sign-out-in-current-logto-implementation}
164
164
165
165
To clear centralized Logto session, app redirects user to the end session endpoint, for example:
166
166
@@ -174,7 +174,7 @@ In current Logto SDK behavior:
174
174
175
175
As a result, current SDK sign-out is treated as **global sign-out**.
176
176
177
-
### What happens during global sign-out
177
+
### What happens during global sign-out\{#what-happens-during-global-sign-out}
178
178
179
179
```mermaid
180
180
flowchart TD
@@ -194,13 +194,13 @@ During global sign-out:
194
194
- If `offline_access`**is** granted, grants are not revoked by end-session.
195
195
- For `offline_access` cases, refresh tokens and grants remain valid until grant expiration.
196
196
197
-
## Grant lifetime and `offline_access` impact
197
+
## Grant lifetime and `offline_access` impact\{#grant-lifetime-and-offline-access-impact}
198
198
199
199
- Default Logto grant TTL is **180 days**.
200
200
- If `offline_access` is granted, end-session does not revoke that app grant by default.
201
201
- Refresh token chain associated with that grant can continue until the grant expires (or is explicitly revoked).
For cross-app consistency, Logto supports [back-channel logout](https://openid.net/specs/openid-connect-backchannel-1_0-final.html).
206
206
@@ -214,7 +214,7 @@ Typical flow:
214
214
2. Logto processes end-session and sends logout token(s) to registered back-channel logout URI(s).
215
215
3. Each app validates logout token and clears its own local session/tokens.
216
216
217
-
## Sign-out methods in Logto SDKs
217
+
## Sign-out methods in Logto SDKs\{#sign-out-methods-in-logto-sdks}
218
218
219
219
-**SPA and web**: `client.signOut()` clears local token storage and redirects to Logto end-session endpoint. You may provide a post-logout redirect URI.
220
220
-**Native (including React Native / Flutter)**: usually clears local token storage only. Sessionless webview means no persistent Logto browser cookie to clear.
@@ -223,7 +223,7 @@ Typical flow:
223
223
For native applications that does not support sessionless webview or does not recognize the `emphasized` settings(Android app using **React Native** or **Flutter** SDK), you may force the user prompt to sign in again by passing the `prompt=login` parameter in the authorization request.
224
224
:::
225
225
226
-
## Enforce re-authentication on every access
226
+
## Enforce re-authentication on every access\{#enforce-re-authentication-on-every-access}
227
227
228
228
For high-security actions, include `prompt=login` in auth requests to bypass SSO and force credential entry each time.
229
229
@@ -235,12 +235,12 @@ Typical combined setting:
235
235
prompt=login consent
236
236
```
237
237
238
-
## FAQs
238
+
## FAQs\{#faqs}
239
239
240
240
<details>
241
241
<summary>
242
242
243
-
### I'm not receiving the back-channel logout notifications.
243
+
### I'm not receiving the back-channel logout notifications.\{#im-not-receiving-the-back-channel-logout-notifications}
Copy file name to clipboardExpand all lines: docs/quick-starts/fragments/_scope-claim-list.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
Here's the list of supported scopes and the corresponding claims:
2
2
3
-
### Standard OIDC scopes
3
+
### Standard OIDC scopes {#standard-oidc-scopes}
4
4
5
5
**`openid`** (default)
6
6
@@ -46,7 +46,7 @@ Please refer to the [OpenID Connect Core 1.0](https://openid.net/specs/openid-co
46
46
Scopes marked with **(default)** are always requested by the Logto SDK. Claims under standard OIDC scopes are always included in the ID token when the corresponding scope is requested — they cannot be turned off.
47
47
:::
48
48
49
-
### Extended scopes
49
+
### Extended scopes {#extended-scopes}
50
50
51
51
The following scopes are extended by Logto and will return claims through the [userinfo endpoint](https://openid.net/specs/openid-connect-core-1_0.html#UserInfo). These claims can also be configured to be included directly in the ID token through <CloudLinkto="/customize-jwt">Console > Custom JWT</CloudLink>. See [Custom ID token](/developers/custom-id-token) for more details.
Copy file name to clipboardExpand all lines: docs/user-management/manage-users.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,7 @@ After you reset the password, copy and send it to the end-user. Once the "Reset
89
89
90
90
You cannot set a specific password for users in the Logto Console, but you can use the [Management API](/integrate-logto/interact-with-management-api)`PATCH /api/users/{userId}/password` to specify a password.
91
91
92
-
### Manage user active sessions
92
+
### Manage user active sessions\{#manage-user-active-sessions}
93
93
94
94
On the "User details" page, navigate to the "Session details" page by clicking on the "Manage" button of a specific session. Here you can view detailed information about the session, such as the device, location, and login time. If you want to log out the user from this session, simply click the "Revoke session" button at the right top corner, and the session will be immediately revoked.
0 commit comments