This is a .NET framework demo application to explain how the OpenID Connect code flow is implemented.
See the tutorial on the Curity Web Site for further details.
web.config is used as a configuration file for the example app. Change the values to match your system.
Name | Type | Mandatory | Default | Description |
---|---|---|---|---|
redirect_uri |
string | ✓ | The redirect uri to use, must be registered for the client at the OpenID Connect server. | |
client_id |
string | ✓ | The id for the client. Used to authenticate the client against the authorization server endpoint. | |
client_secret |
string | ✓ | The shared secret to use for authentication against the token endpoint. | |
scope |
string | openid |
The scopes to ask for. | |
jwks_uri |
URL | if issuer is not set and the openid scope is requested |
The URL that points to the JWK set. | |
authorization_endpoint |
URL | if issuer is not set |
The URL to the authorization_endpoint. | |
token_endpoint |
URL | if issuer is not set |
The URL to the token_endpoint. | |
issuer |
string | if the openid scope is requested. |
The ID of the token issuer. This enables metadata discovery which will override the configuration set up in this file. | |
base_url |
string | base url to be added to internal redirects. Set this to enable the client to be behind a proxy. |
For questions and support, contact Curity AB:
Curity AB
Copyright (C) 2016 Curity AB.