Skip to content

Commit 3768192

Browse files
committed
docs: update verbiage "provider" > "authorization server"
1 parent 3683436 commit 3768192

File tree

7 files changed

+82
-82
lines changed

7 files changed

+82
-82
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ If you or your company use this module, or you need help using/upgrading the mod
8787
## [Documentation](/docs/README.md) & Configuration
8888

8989
oidc-provider can be mounted to existing connect, express, fastify, hapi, or koa applications, see
90-
[how](/docs/README.md#mounting-oidc-provider). The provider allows to be extended and configured in
90+
[how](/docs/README.md#mounting-oidc-provider). The authorization server allows to be extended and configured in
9191
various ways to fit a variety of uses. See the [documentation](/docs/README.md) and [example folder](/example).
9292

9393
```js

docs/README.md

Lines changed: 40 additions & 40 deletions
Large diffs are not rendered by default.

example/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@
33
See the following examples
44

55
- [Koa](/example/koa.js)
6-
- the provider is a part of your Koa application
6+
- the authorization server is a part of your Koa application
77
- [Express](/example/express.js)
8-
- the provider is a part of your express application
8+
- the authorization server is a part of your express application
99
- [Standalone](/example/standalone.js)
10-
- the provider is completely standalone
10+
- the authorization server is completely standalone
1111

1212
Further resources
1313

lib/helpers/defaults.js

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ async function secretFactory(ctx) {
195195
async function defaultResource(ctx, client, oneOf) {
196196
// @param ctx - koa request context
197197
// @param client - client making the request
198-
// @param oneOf {string[]} - The OP needs to select **one** of the values provided.
198+
// @param oneOf {string[]} - The authorization server needs to select **one** of the values provided.
199199
// Default is that the array is provided so that the request will fail.
200200
// This argument is only provided when called during
201201
// Authorization Code / Refresh Token / Device Code exchanges.
@@ -360,7 +360,7 @@ async function postLogoutSuccessSource(ctx) {
360360
shouldChange('features.rpInitiatedLogout.postLogoutSuccessSource', 'customize the look of the default post logout success page');
361361
const {
362362
clientId, clientName, clientUri, initiateLoginUri, logoUri, policyUri, tosUri,
363-
} = ctx.oidc.client || {}; // client is defined if the user chose to stay logged in with the OP
363+
} = ctx.oidc.client || {}; // client is defined if the user chose to stay logged in with the authorization server
364364
const display = clientName || clientId;
365365
ctx.body = `<!DOCTYPE html>
366366
<html>
@@ -597,7 +597,7 @@ function makeDefaults() {
597597
/*
598598
* acrValues
599599
*
600-
* description: Array of strings, the Authentication Context Class References that the OP supports.
600+
* description: Array of strings, the Authentication Context Class References that the authorization server supports.
601601
*/
602602
acrValues: [],
603603

@@ -668,7 +668,7 @@ function makeDefaults() {
668668
*
669669
* description: Array of objects representing client metadata. These clients are referred to as
670670
* static, they don't expire, never reload, are always available. In addition to these
671-
* clients the provider will use your adapter's `find` method when a non-static client_id is
671+
* clients the authorization server will use your adapter's `find` method when a non-static client_id is
672672
* encountered. If you only wish to support statically configured clients and
673673
* no dynamic registration then make it so that your adapter resolves client find calls with a
674674
* falsy value (e.g. `return Promise.resolve()`) and don't take unnecessary DB trips.
@@ -920,7 +920,7 @@ function makeDefaults() {
920920
* be aware that breaking changes may occur between draft implementations and that those
921921
* will be published as minor versions of oidc-provider. See the example below on how to
922922
* acknowledge the specification is a draft (this will remove the warning log) and ensure
923-
* the provider instance will fail to instantiate if a new version of oidc-provider bundles
923+
* the Provider instance will fail to instantiate if a new version of oidc-provider bundles
924924
* newer version of the RFC with breaking changes in it.
925925
*
926926
* example: Acknowledging an experimental feature
@@ -1408,7 +1408,7 @@ function makeDefaults() {
14081408
* features.pushedAuthorizationRequests.requirePushedAuthorizationRequests
14091409
*
14101410
* description: Makes the use of `PAR` required for all authorization
1411-
* requests as an OP policy.
1411+
* requests as an authorization server policy.
14121412
*/
14131413
requirePushedAuthorizationRequests: false,
14141414

@@ -1555,7 +1555,7 @@ function makeDefaults() {
15551555
/*
15561556
* features.registrationManagement.rotateRegistrationAccessToken
15571557
*
1558-
* description: Enables registration access token rotation. The provider will discard the
1558+
* description: Enables registration access token rotation. The authorization server will discard the
15591559
* current Registration Access Token with a successful update and issue a new one, returning
15601560
* it to the client with the Registration Update Response. Supported
15611561
* values are
@@ -1898,7 +1898,7 @@ function makeDefaults() {
18981898
* features.requestObjects.requireSignedRequestObject
18991899
*
19001900
* description: Makes the use of signed request objects required for all authorization
1901-
* requests as an OP policy.
1901+
* requests as an authorization server policy.
19021902
*/
19031903
requireSignedRequestObject: false,
19041904

@@ -2107,7 +2107,7 @@ function makeDefaults() {
21072107
/*
21082108
* jwks
21092109
*
2110-
* description: JSON Web Key Set used by the provider for signing and decryption. The object must
2110+
* description: JSON Web Key Set used by the authorization server for signing and decryption. The object must
21112111
* be in [JWK Set format](https://www.rfc-editor.org/rfc/rfc7517.html#section-5). All provided keys must
21122112
* be private keys.
21132113
*
@@ -2138,7 +2138,7 @@ function makeDefaults() {
21382138
/*
21392139
* responseTypes
21402140
*
2141-
* description: Array of response_type values that the OP supports. The default omits all response
2141+
* description: Array of response_type values that the authorization server supports. The default omits all response
21422142
* types that result in access tokens being issued by the authorization endpoint directly as per
21432143
* [OAuth 2.0 Security Best Current Practice](https://tools.ietf.org/html/draft-ietf-oauth-security-topics-13#section-3.1.2)
21442144
* You can still enable them if you need to.
@@ -2182,7 +2182,7 @@ function makeDefaults() {
21822182
/*
21832183
* pkce.required
21842184
*
2185-
* description: Configures if and when the OP requires clients to use `PKCE`. This helper is called
2185+
* description: Configures if and when the authorization server requires clients to use `PKCE`. This helper is called
21862186
* whenever an authorization request lacks the code_challenge parameter.
21872187
* Return
21882188
* - `false` to allow the request to continue without `PKCE`
@@ -2194,7 +2194,7 @@ function makeDefaults() {
21942194
/*
21952195
* routes
21962196
*
2197-
* description: Routing values used by the OP. Only provide routes starting with "/"
2197+
* description: Routing values used by the authorization server. Only provide routes starting with "/"
21982198
*/
21992199
routes: {
22002200
authorization: '/auth',
@@ -2214,8 +2214,8 @@ function makeDefaults() {
22142214
/*
22152215
* scopes
22162216
*
2217-
* description: Array of additional scope values that the OP signals to support in the discovery
2218-
* endpoint. Only add scopes the OP has a corresponding resource for.
2217+
* description: Array of additional scope values that the authorization server signals to support in the discovery
2218+
* endpoint. Only add scopes the authorization server has a corresponding resource for.
22192219
* Resource Server scopes don't belong here, see `features.resourceIndicators` for configuring
22202220
* those.
22212221
*/
@@ -2224,7 +2224,7 @@ function makeDefaults() {
22242224
/*
22252225
* subjectTypes
22262226
*
2227-
* description: Array of the Subject Identifier types that this OP supports. When only `pairwise`
2227+
* description: Array of the Subject Identifier types that this authorization server supports. When only `pairwise`
22282228
* is supported it becomes the default `subject_type` client metadata value. Valid types are
22292229
* - `public`
22302230
* - `pairwise`
@@ -2234,7 +2234,7 @@ function makeDefaults() {
22342234
/*
22352235
* pairwiseIdentifier
22362236
*
2237-
* description: Function used by the OP when resolving pairwise ID Token and Userinfo sub claim
2237+
* description: Function used by the authorization server when resolving pairwise ID Token and Userinfo sub claim
22382238
* values. See [`OIDC Core 1.0`](https://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg)
22392239
* recommendation: Since this might be called several times in one request with the same arguments
22402240
* consider using memoization or otherwise caching the result based on account and client
@@ -2459,7 +2459,7 @@ function makeDefaults() {
24592459
/*
24602460
* rotateRefreshToken
24612461
*
2462-
* description: Configures if and how the OP rotates refresh tokens after they are used. Supported
2462+
* description: Configures if and how the authorization server rotates refresh tokens after they are used. Supported
24632463
* values are
24642464
* - `false` refresh tokens are not rotated and their initial expiration date is final
24652465
* - `true` refresh tokens are rotated when used, current token is marked as
@@ -2479,7 +2479,7 @@ function makeDefaults() {
24792479
/*
24802480
* enabledJWA
24812481
*
2482-
* description: Fine-tune the algorithms your provider will support by declaring algorithm
2482+
* description: Fine-tune the algorithms the authorization server supports by declaring algorithm
24832483
* values for each respective JWA use
24842484
* @nodefault
24852485
*/
@@ -2488,7 +2488,7 @@ function makeDefaults() {
24882488
/*
24892489
* enabledJWA.clientAuthSigningAlgValues
24902490
*
2491-
* description: JWS "alg" Algorithm values the provider supports for signed JWT Client Authentication
2491+
* description: JWS "alg" Algorithm values the authorization server supports for signed JWT Client Authentication
24922492
*
24932493
* example: Supported values list
24942494
* ```js
@@ -2508,7 +2508,7 @@ function makeDefaults() {
25082508
/*
25092509
* enabledJWA.idTokenSigningAlgValues
25102510
*
2511-
* description: JWS "alg" Algorithm values the provider supports to sign ID Tokens with.
2511+
* description: JWS "alg" Algorithm values the authorization server supports to sign ID Tokens with.
25122512
*
25132513
* example: Supported values list
25142514
* ```js
@@ -2528,7 +2528,7 @@ function makeDefaults() {
25282528
/*
25292529
* enabledJWA.requestObjectSigningAlgValues
25302530
*
2531-
* description: JWS "alg" Algorithm values the provider supports to receive signed Request Objects (`JAR`) with
2531+
* description: JWS "alg" Algorithm values the authorization server supports to receive signed Request Objects (`JAR`) with
25322532
*
25332533
* example: Supported values list
25342534
* ```js
@@ -2548,7 +2548,7 @@ function makeDefaults() {
25482548
/*
25492549
* enabledJWA.userinfoSigningAlgValues
25502550
*
2551-
* description: JWS "alg" Algorithm values the provider supports to sign UserInfo responses with
2551+
* description: JWS "alg" Algorithm values the authorization server supports to sign UserInfo responses with
25522552
*
25532553
* example: Supported values list
25542554
* ```js
@@ -2568,7 +2568,7 @@ function makeDefaults() {
25682568
/*
25692569
* enabledJWA.introspectionSigningAlgValues
25702570
*
2571-
* description: JWS "alg" Algorithm values the provider supports to sign JWT Introspection responses with
2571+
* description: JWS "alg" Algorithm values the authorization server supports to sign JWT Introspection responses with
25722572
*
25732573
* example: Supported values list
25742574
* ```js
@@ -2588,7 +2588,7 @@ function makeDefaults() {
25882588
/*
25892589
* enabledJWA.authorizationSigningAlgValues
25902590
*
2591-
* description: JWS "alg" Algorithm values the provider supports to sign JWT Authorization Responses (`JARM`) with
2591+
* description: JWS "alg" Algorithm values the authorization server supports to sign JWT Authorization Responses (`JARM`) with
25922592
*
25932593
* example: Supported values list
25942594
* ```js
@@ -2608,7 +2608,7 @@ function makeDefaults() {
26082608
/*
26092609
* enabledJWA.idTokenEncryptionAlgValues
26102610
*
2611-
* description: JWE "alg" Algorithm values the provider supports for ID Token encryption
2611+
* description: JWE "alg" Algorithm values the authorization server supports for ID Token encryption
26122612
*
26132613
* example: Supported values list
26142614
* ```js
@@ -2631,7 +2631,7 @@ function makeDefaults() {
26312631
/*
26322632
* enabledJWA.requestObjectEncryptionAlgValues
26332633
*
2634-
* description: JWE "alg" Algorithm values the provider supports to receive encrypted Request Objects (`JAR`) with
2634+
* description: JWE "alg" Algorithm values the authorization server supports to receive encrypted Request Objects (`JAR`) with
26352635
*
26362636
* example: Supported values list
26372637
* ```js
@@ -2654,7 +2654,7 @@ function makeDefaults() {
26542654
/*
26552655
* enabledJWA.userinfoEncryptionAlgValues
26562656
*
2657-
* description: JWE "alg" Algorithm values the provider supports for UserInfo Response encryption
2657+
* description: JWE "alg" Algorithm values the authorization server supports for UserInfo Response encryption
26582658
*
26592659
* example: Supported values list
26602660
* ```js
@@ -2677,7 +2677,7 @@ function makeDefaults() {
26772677
/*
26782678
* enabledJWA.introspectionEncryptionAlgValues
26792679
*
2680-
* description: JWE "alg" Algorithm values the provider supports for JWT Introspection response
2680+
* description: JWE "alg" Algorithm values the authorization server supports for JWT Introspection response
26812681
* encryption
26822682
*
26832683
* example: Supported values list
@@ -2701,7 +2701,7 @@ function makeDefaults() {
27012701
/*
27022702
* enabledJWA.authorizationEncryptionAlgValues
27032703
*
2704-
* description: JWE "alg" Algorithm values the provider supports for JWT Authorization response (`JARM`)
2704+
* description: JWE "alg" Algorithm values the authorization server supports for JWT Authorization response (`JARM`)
27052705
* encryption
27062706
*
27072707
* example: Supported values list
@@ -2725,7 +2725,7 @@ function makeDefaults() {
27252725
/*
27262726
* enabledJWA.idTokenEncryptionEncValues
27272727
*
2728-
* description: JWE "enc" Content Encryption Algorithm values the provider supports to encrypt ID Tokens with
2728+
* description: JWE "enc" Content Encryption Algorithm values the authorization server supports to encrypt ID Tokens with
27292729
*
27302730
* example: Supported values list
27312731
* ```js
@@ -2741,7 +2741,7 @@ function makeDefaults() {
27412741
/*
27422742
* enabledJWA.requestObjectEncryptionEncValues
27432743
*
2744-
* description: JWE "enc" Content Encryption Algorithm values the provider supports to decrypt Request Objects (`JAR`) with
2744+
* description: JWE "enc" Content Encryption Algorithm values the authorization server supports to decrypt Request Objects (`JAR`) with
27452745
*
27462746
* example: Supported values list
27472747
* ```js
@@ -2757,7 +2757,7 @@ function makeDefaults() {
27572757
/*
27582758
* enabledJWA.userinfoEncryptionEncValues
27592759
*
2760-
* description: JWE "enc" Content Encryption Algorithm values the provider supports to encrypt UserInfo responses with
2760+
* description: JWE "enc" Content Encryption Algorithm values the authorization server supports to encrypt UserInfo responses with
27612761
*
27622762
* example: Supported values list
27632763
* ```js
@@ -2773,7 +2773,7 @@ function makeDefaults() {
27732773
/*
27742774
* enabledJWA.introspectionEncryptionEncValues
27752775
*
2776-
* description: JWE "enc" Content Encryption Algorithm values the provider supports to encrypt JWT Introspection responses with
2776+
* description: JWE "enc" Content Encryption Algorithm values the authorization server supports to encrypt JWT Introspection responses with
27772777
*
27782778
* example: Supported values list
27792779
* ```js
@@ -2789,7 +2789,7 @@ function makeDefaults() {
27892789
/*
27902790
* enabledJWA.authorizationEncryptionEncValues
27912791
*
2792-
* description: JWE "enc" Content Encryption Algorithm values the provider supports to encrypt JWT Authorization Responses (`JARM`) with
2792+
* description: JWE "enc" Content Encryption Algorithm values the authorization server supports to encrypt JWT Authorization Responses (`JARM`) with
27932793
*
27942794
* example: Supported values list
27952795
* ```js
@@ -2805,7 +2805,7 @@ function makeDefaults() {
28052805
/*
28062806
* enabledJWA.dPoPSigningAlgValues
28072807
*
2808-
* description: JWS "alg" Algorithm values the provider supports to verify signed DPoP proof JWTs with
2808+
* description: JWS "alg" Algorithm values the authorization server supports to verify signed DPoP proof JWTs with
28092809
*
28102810
* example: Supported values list
28112811
* ```js

recipes/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ If you or your company use this module, or you need help using/upgrading the mod
1111

1212
---
1313

14-
- [Accepting Dynamic OP Scope Values](dynamic_op_scope.md)
14+
- [Accepting Dynamic Authorization Server Scope Values](dynamic_op_scope.md)
1515
- [Allowing HTTP and/or localhost for implicit response types](implicit_http_localhost.md)
1616
- [Applying default client scope](default_scope.md)
1717
- [Claim configuration](claim_configuration.md)

recipes/dynamic_op_scope.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Accepting Dynamic OP Scope Values
1+
# Accepting Dynamic Authorization Server Scope Values
22

33
- built for version: ^7.1.2 || ^8.0.0
44
- For dynamic scopes at the Resource Server you'd use the helpers in the `resourceIndicators` feature.

recipes/skip_consent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ your own
77
applications
88

99
Sometimes your use-case doesn't need a consent screen.
10-
This use-case might occur if your provider has only *first-party* clients configured.
10+
This use-case might occur if the authorization server has only *first-party* clients configured.
1111
To achieve that you want to add the requested claims/scopes/resource scopes to the grant:
1212

1313
```js

0 commit comments

Comments
 (0)