|
21 | 21 | 'client_secret' => env('OIDC_CLIENT_SECRET', ''),
|
22 | 22 |
|
23 | 23 | /**
|
24 |
| - * Configuration for the token authentication. |
| 24 | + * Configuration for client authentication. |
| 25 | + * |
| 26 | + * By default, the client authentication method used is either `client_secret_basic`, `client_secret_post`, |
| 27 | + * `client_secret_jwt`, or no authentication, depending on provider support. |
| 28 | + * To use `private_key_jwt` client authentication, configure the options below. |
25 | 29 | */
|
26 | 30 | 'client_authentication' => [
|
| 31 | + |
27 | 32 | /**
|
28 |
| - * When you want to use `private_key_jwt` client authentication then you can specify the path to the private key. |
| 33 | + * The file path to the private key used for client authentication. |
| 34 | + * This private key is required for signing the JWT when using `private_key_jwt` client authentication. |
| 35 | + * |
| 36 | + * Example: '/path/to/private.key' |
29 | 37 | */
|
30 | 38 | 'signing_private_key_path' => env('OIDC_SIGNING_PRIVATE_KEY_PATH'),
|
31 | 39 |
|
32 | 40 | /**
|
33 |
| - * When you want to use `private_key_jwt` client authentication then you can specify the signing algorithm. |
34 |
| - * For a list of supported algorithms see https://tools.ietf.org/html/rfc7518#section-3.1 |
| 41 | + * The signing algorithm used for `private_key_jwt` client authentication. |
| 42 | + * |
| 43 | + * Default: 'RS256' |
| 44 | + * Example Values: 'RS256', 'HS256', 'ES256' |
| 45 | + * For a list of supported algorithms, see https://tools.ietf.org/html/rfc7518#section-3.1 |
35 | 46 | */
|
36 | 47 | 'signing_algorithm' => env('OIDC_SIGNING_ALGORITHM', 'RS256'),
|
37 | 48 |
|
38 | 49 | /**
|
39 |
| - * When you want to use `private_key_jwt` client authentication then need |
40 |
| - * to specify the available signature algorithms. |
| 50 | + * A list of signature algorithms available for use. |
| 51 | + * This list is used to configure the AlgorithmManager and should include class names. |
41 | 52 | *
|
42 |
| - * The input is used for the AlgorithmManager and should be a list of class names. |
43 |
| - * See https://web-token.spomky-labs.com/the-components/algorithm-management-jwa |
| 53 | + * For more details, see https://web-token.spomky-labs.com/the-components/algorithm-management-jwa |
44 | 54 | */
|
45 | 55 | 'signature_algorithms' => [
|
46 | 56 | \Jose\Component\Signature\Algorithm\RS256::class,
|
47 | 57 | ],
|
48 | 58 |
|
49 | 59 | /**
|
50 |
| - * Token lifetime in seconds, used to set the expiration time of the JWT. |
51 |
| - * This is used when you are using `private_key_jwt` client authentication. |
| 60 | + * The duration (in seconds) for which the token remains valid. |
| 61 | + * This sets the expiration time of the JWT when using `private_key_jwt` client authentication. |
52 | 62 | */
|
53 | 63 | 'token_lifetime_in_seconds' => 60,
|
| 64 | + |
54 | 65 | ],
|
55 | 66 |
|
56 | 67 | /**
|
57 |
| - * Only needed when response of user info endpoint is encrypted. |
58 |
| - * This is the path to the JWE decryption key. |
| 68 | + * Path to the private key used to decrypt the JWE response from the user info endpoint. |
| 69 | + * This is only required when the response from the user info endpoint is encrypted. |
59 | 70 | *
|
60 |
| - * You could add multiple decryption key paths comma separated. |
| 71 | + * Multiple decryption key paths can be specified, separated by commas. |
61 | 72 | */
|
62 | 73 | 'decryption_key_path' => env('OIDC_DECRYPTION_KEY_PATH', ''),
|
63 | 74 |
|
|
75 | 86 | * Configuration Cache
|
76 | 87 | */
|
77 | 88 | 'configuration_cache' => [
|
| 89 | + |
78 | 90 | /**
|
79 | 91 | * The cache store to use.
|
80 | 92 | */
|
|
84 | 96 | * The cache TTL in seconds.
|
85 | 97 | */
|
86 | 98 | 'ttl' => env('OIDC_CONFIGURATION_CACHE_TTL', 60 * 60 * 24),
|
| 99 | + |
87 | 100 | ],
|
88 | 101 |
|
89 | 102 | /**
|
90 | 103 | * Route configuration
|
91 | 104 | */
|
92 | 105 | 'route_configuration' => [
|
| 106 | + |
93 | 107 | /**
|
94 | 108 | * Enable or disable the login route.
|
95 | 109 | */
|
|
111 | 125 | * The prefix of the login route.
|
112 | 126 | */
|
113 | 127 | 'prefix' => '',
|
| 128 | + |
114 | 129 | ],
|
115 | 130 |
|
116 | 131 | /**
|
|
0 commit comments