@@ -195,7 +195,7 @@ async function secretFactory(ctx) {
195195async function defaultResource ( ctx , client , oneOf ) {
196196 // @param ctx - koa request context
197197 // @param client - client making the request
198- // @param oneOf {string[]} - The OP needs to select **one** of the values provided.
198+ // @param oneOf {string[]} - The authorization server needs to select **one** of the values provided.
199199 // Default is that the array is provided so that the request will fail.
200200 // This argument is only provided when called during
201201 // Authorization Code / Refresh Token / Device Code exchanges.
@@ -360,7 +360,7 @@ async function postLogoutSuccessSource(ctx) {
360360 shouldChange ( 'features.rpInitiatedLogout.postLogoutSuccessSource' , 'customize the look of the default post logout success page' ) ;
361361 const {
362362 clientId, clientName, clientUri, initiateLoginUri, logoUri, policyUri, tosUri,
363- } = ctx . oidc . client || { } ; // client is defined if the user chose to stay logged in with the OP
363+ } = ctx . oidc . client || { } ; // client is defined if the user chose to stay logged in with the authorization server
364364 const display = clientName || clientId ;
365365 ctx . body = `<!DOCTYPE html>
366366 <html>
@@ -597,7 +597,7 @@ function makeDefaults() {
597597 /*
598598 * acrValues
599599 *
600- * description: Array of strings, the Authentication Context Class References that the OP supports.
600+ * description: Array of strings, the Authentication Context Class References that the authorization server supports.
601601 */
602602 acrValues : [ ] ,
603603
@@ -668,7 +668,7 @@ function makeDefaults() {
668668 *
669669 * description: Array of objects representing client metadata. These clients are referred to as
670670 * static, they don't expire, never reload, are always available. In addition to these
671- * clients the provider will use your adapter's `find` method when a non-static client_id is
671+ * clients the authorization server will use your adapter's `find` method when a non-static client_id is
672672 * encountered. If you only wish to support statically configured clients and
673673 * no dynamic registration then make it so that your adapter resolves client find calls with a
674674 * falsy value (e.g. `return Promise.resolve()`) and don't take unnecessary DB trips.
@@ -920,7 +920,7 @@ function makeDefaults() {
920920 * be aware that breaking changes may occur between draft implementations and that those
921921 * will be published as minor versions of oidc-provider. See the example below on how to
922922 * acknowledge the specification is a draft (this will remove the warning log) and ensure
923- * the provider instance will fail to instantiate if a new version of oidc-provider bundles
923+ * the Provider instance will fail to instantiate if a new version of oidc-provider bundles
924924 * newer version of the RFC with breaking changes in it.
925925 *
926926 * example: Acknowledging an experimental feature
@@ -1408,7 +1408,7 @@ function makeDefaults() {
14081408 * features.pushedAuthorizationRequests.requirePushedAuthorizationRequests
14091409 *
14101410 * description: Makes the use of `PAR` required for all authorization
1411- * requests as an OP policy.
1411+ * requests as an authorization server policy.
14121412 */
14131413 requirePushedAuthorizationRequests : false ,
14141414
@@ -1555,7 +1555,7 @@ function makeDefaults() {
15551555 /*
15561556 * features.registrationManagement.rotateRegistrationAccessToken
15571557 *
1558- * description: Enables registration access token rotation. The provider will discard the
1558+ * description: Enables registration access token rotation. The authorization server will discard the
15591559 * current Registration Access Token with a successful update and issue a new one, returning
15601560 * it to the client with the Registration Update Response. Supported
15611561 * values are
@@ -1898,7 +1898,7 @@ function makeDefaults() {
18981898 * features.requestObjects.requireSignedRequestObject
18991899 *
19001900 * description: Makes the use of signed request objects required for all authorization
1901- * requests as an OP policy.
1901+ * requests as an authorization server policy.
19021902 */
19031903 requireSignedRequestObject : false ,
19041904
@@ -2107,7 +2107,7 @@ function makeDefaults() {
21072107 /*
21082108 * jwks
21092109 *
2110- * description: JSON Web Key Set used by the provider for signing and decryption. The object must
2110+ * description: JSON Web Key Set used by the authorization server for signing and decryption. The object must
21112111 * be in [JWK Set format](https://www.rfc-editor.org/rfc/rfc7517.html#section-5). All provided keys must
21122112 * be private keys.
21132113 *
@@ -2138,7 +2138,7 @@ function makeDefaults() {
21382138 /*
21392139 * responseTypes
21402140 *
2141- * description: Array of response_type values that the OP supports. The default omits all response
2141+ * description: Array of response_type values that the authorization server supports. The default omits all response
21422142 * types that result in access tokens being issued by the authorization endpoint directly as per
21432143 * [OAuth 2.0 Security Best Current Practice](https://tools.ietf.org/html/draft-ietf-oauth-security-topics-13#section-3.1.2)
21442144 * You can still enable them if you need to.
@@ -2182,7 +2182,7 @@ function makeDefaults() {
21822182 /*
21832183 * pkce.required
21842184 *
2185- * description: Configures if and when the OP requires clients to use `PKCE`. This helper is called
2185+ * description: Configures if and when the authorization server requires clients to use `PKCE`. This helper is called
21862186 * whenever an authorization request lacks the code_challenge parameter.
21872187 * Return
21882188 * - `false` to allow the request to continue without `PKCE`
@@ -2194,7 +2194,7 @@ function makeDefaults() {
21942194 /*
21952195 * routes
21962196 *
2197- * description: Routing values used by the OP . Only provide routes starting with "/"
2197+ * description: Routing values used by the authorization server . Only provide routes starting with "/"
21982198 */
21992199 routes : {
22002200 authorization : '/auth' ,
@@ -2214,8 +2214,8 @@ function makeDefaults() {
22142214 /*
22152215 * scopes
22162216 *
2217- * description: Array of additional scope values that the OP signals to support in the discovery
2218- * endpoint. Only add scopes the OP has a corresponding resource for.
2217+ * description: Array of additional scope values that the authorization server signals to support in the discovery
2218+ * endpoint. Only add scopes the authorization server has a corresponding resource for.
22192219 * Resource Server scopes don't belong here, see `features.resourceIndicators` for configuring
22202220 * those.
22212221 */
@@ -2224,7 +2224,7 @@ function makeDefaults() {
22242224 /*
22252225 * subjectTypes
22262226 *
2227- * description: Array of the Subject Identifier types that this OP supports. When only `pairwise`
2227+ * description: Array of the Subject Identifier types that this authorization server supports. When only `pairwise`
22282228 * is supported it becomes the default `subject_type` client metadata value. Valid types are
22292229 * - `public`
22302230 * - `pairwise`
@@ -2234,7 +2234,7 @@ function makeDefaults() {
22342234 /*
22352235 * pairwiseIdentifier
22362236 *
2237- * description: Function used by the OP when resolving pairwise ID Token and Userinfo sub claim
2237+ * description: Function used by the authorization server when resolving pairwise ID Token and Userinfo sub claim
22382238 * values. See [`OIDC Core 1.0`](https://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg)
22392239 * recommendation: Since this might be called several times in one request with the same arguments
22402240 * consider using memoization or otherwise caching the result based on account and client
@@ -2459,7 +2459,7 @@ function makeDefaults() {
24592459 /*
24602460 * rotateRefreshToken
24612461 *
2462- * description: Configures if and how the OP rotates refresh tokens after they are used. Supported
2462+ * description: Configures if and how the authorization server rotates refresh tokens after they are used. Supported
24632463 * values are
24642464 * - `false` refresh tokens are not rotated and their initial expiration date is final
24652465 * - `true` refresh tokens are rotated when used, current token is marked as
@@ -2479,7 +2479,7 @@ function makeDefaults() {
24792479 /*
24802480 * enabledJWA
24812481 *
2482- * description: Fine-tune the algorithms your provider will support by declaring algorithm
2482+ * description: Fine-tune the algorithms the authorization server supports by declaring algorithm
24832483 * values for each respective JWA use
24842484 * @nodefault
24852485 */
@@ -2488,7 +2488,7 @@ function makeDefaults() {
24882488 /*
24892489 * enabledJWA.clientAuthSigningAlgValues
24902490 *
2491- * description: JWS "alg" Algorithm values the provider supports for signed JWT Client Authentication
2491+ * description: JWS "alg" Algorithm values the authorization server supports for signed JWT Client Authentication
24922492 *
24932493 * example: Supported values list
24942494 * ```js
@@ -2508,7 +2508,7 @@ function makeDefaults() {
25082508 /*
25092509 * enabledJWA.idTokenSigningAlgValues
25102510 *
2511- * description: JWS "alg" Algorithm values the provider supports to sign ID Tokens with.
2511+ * description: JWS "alg" Algorithm values the authorization server supports to sign ID Tokens with.
25122512 *
25132513 * example: Supported values list
25142514 * ```js
@@ -2528,7 +2528,7 @@ function makeDefaults() {
25282528 /*
25292529 * enabledJWA.requestObjectSigningAlgValues
25302530 *
2531- * description: JWS "alg" Algorithm values the provider supports to receive signed Request Objects (`JAR`) with
2531+ * description: JWS "alg" Algorithm values the authorization server supports to receive signed Request Objects (`JAR`) with
25322532 *
25332533 * example: Supported values list
25342534 * ```js
@@ -2548,7 +2548,7 @@ function makeDefaults() {
25482548 /*
25492549 * enabledJWA.userinfoSigningAlgValues
25502550 *
2551- * description: JWS "alg" Algorithm values the provider supports to sign UserInfo responses with
2551+ * description: JWS "alg" Algorithm values the authorization server supports to sign UserInfo responses with
25522552 *
25532553 * example: Supported values list
25542554 * ```js
@@ -2568,7 +2568,7 @@ function makeDefaults() {
25682568 /*
25692569 * enabledJWA.introspectionSigningAlgValues
25702570 *
2571- * description: JWS "alg" Algorithm values the provider supports to sign JWT Introspection responses with
2571+ * description: JWS "alg" Algorithm values the authorization server supports to sign JWT Introspection responses with
25722572 *
25732573 * example: Supported values list
25742574 * ```js
@@ -2588,7 +2588,7 @@ function makeDefaults() {
25882588 /*
25892589 * enabledJWA.authorizationSigningAlgValues
25902590 *
2591- * description: JWS "alg" Algorithm values the provider supports to sign JWT Authorization Responses (`JARM`) with
2591+ * description: JWS "alg" Algorithm values the authorization server supports to sign JWT Authorization Responses (`JARM`) with
25922592 *
25932593 * example: Supported values list
25942594 * ```js
@@ -2608,7 +2608,7 @@ function makeDefaults() {
26082608 /*
26092609 * enabledJWA.idTokenEncryptionAlgValues
26102610 *
2611- * description: JWE "alg" Algorithm values the provider supports for ID Token encryption
2611+ * description: JWE "alg" Algorithm values the authorization server supports for ID Token encryption
26122612 *
26132613 * example: Supported values list
26142614 * ```js
@@ -2631,7 +2631,7 @@ function makeDefaults() {
26312631 /*
26322632 * enabledJWA.requestObjectEncryptionAlgValues
26332633 *
2634- * description: JWE "alg" Algorithm values the provider supports to receive encrypted Request Objects (`JAR`) with
2634+ * description: JWE "alg" Algorithm values the authorization server supports to receive encrypted Request Objects (`JAR`) with
26352635 *
26362636 * example: Supported values list
26372637 * ```js
@@ -2654,7 +2654,7 @@ function makeDefaults() {
26542654 /*
26552655 * enabledJWA.userinfoEncryptionAlgValues
26562656 *
2657- * description: JWE "alg" Algorithm values the provider supports for UserInfo Response encryption
2657+ * description: JWE "alg" Algorithm values the authorization server supports for UserInfo Response encryption
26582658 *
26592659 * example: Supported values list
26602660 * ```js
@@ -2677,7 +2677,7 @@ function makeDefaults() {
26772677 /*
26782678 * enabledJWA.introspectionEncryptionAlgValues
26792679 *
2680- * description: JWE "alg" Algorithm values the provider supports for JWT Introspection response
2680+ * description: JWE "alg" Algorithm values the authorization server supports for JWT Introspection response
26812681 * encryption
26822682 *
26832683 * example: Supported values list
@@ -2701,7 +2701,7 @@ function makeDefaults() {
27012701 /*
27022702 * enabledJWA.authorizationEncryptionAlgValues
27032703 *
2704- * description: JWE "alg" Algorithm values the provider supports for JWT Authorization response (`JARM`)
2704+ * description: JWE "alg" Algorithm values the authorization server supports for JWT Authorization response (`JARM`)
27052705 * encryption
27062706 *
27072707 * example: Supported values list
@@ -2725,7 +2725,7 @@ function makeDefaults() {
27252725 /*
27262726 * enabledJWA.idTokenEncryptionEncValues
27272727 *
2728- * description: JWE "enc" Content Encryption Algorithm values the provider supports to encrypt ID Tokens with
2728+ * description: JWE "enc" Content Encryption Algorithm values the authorization server supports to encrypt ID Tokens with
27292729 *
27302730 * example: Supported values list
27312731 * ```js
@@ -2741,7 +2741,7 @@ function makeDefaults() {
27412741 /*
27422742 * enabledJWA.requestObjectEncryptionEncValues
27432743 *
2744- * description: JWE "enc" Content Encryption Algorithm values the provider supports to decrypt Request Objects (`JAR`) with
2744+ * description: JWE "enc" Content Encryption Algorithm values the authorization server supports to decrypt Request Objects (`JAR`) with
27452745 *
27462746 * example: Supported values list
27472747 * ```js
@@ -2757,7 +2757,7 @@ function makeDefaults() {
27572757 /*
27582758 * enabledJWA.userinfoEncryptionEncValues
27592759 *
2760- * description: JWE "enc" Content Encryption Algorithm values the provider supports to encrypt UserInfo responses with
2760+ * description: JWE "enc" Content Encryption Algorithm values the authorization server supports to encrypt UserInfo responses with
27612761 *
27622762 * example: Supported values list
27632763 * ```js
@@ -2773,7 +2773,7 @@ function makeDefaults() {
27732773 /*
27742774 * enabledJWA.introspectionEncryptionEncValues
27752775 *
2776- * description: JWE "enc" Content Encryption Algorithm values the provider supports to encrypt JWT Introspection responses with
2776+ * description: JWE "enc" Content Encryption Algorithm values the authorization server supports to encrypt JWT Introspection responses with
27772777 *
27782778 * example: Supported values list
27792779 * ```js
@@ -2789,7 +2789,7 @@ function makeDefaults() {
27892789 /*
27902790 * enabledJWA.authorizationEncryptionEncValues
27912791 *
2792- * description: JWE "enc" Content Encryption Algorithm values the provider supports to encrypt JWT Authorization Responses (`JARM`) with
2792+ * description: JWE "enc" Content Encryption Algorithm values the authorization server supports to encrypt JWT Authorization Responses (`JARM`) with
27932793 *
27942794 * example: Supported values list
27952795 * ```js
@@ -2805,7 +2805,7 @@ function makeDefaults() {
28052805 /*
28062806 * enabledJWA.dPoPSigningAlgValues
28072807 *
2808- * description: JWS "alg" Algorithm values the provider supports to verify signed DPoP proof JWTs with
2808+ * description: JWS "alg" Algorithm values the authorization server supports to verify signed DPoP proof JWTs with
28092809 *
28102810 * example: Supported values list
28112811 * ```js
0 commit comments