-
- In the authentication request:
- Specify
response_type = code
. - Specify
redirect_uri = http://localhost:8090/code_flow_callback
- Specify
- In the authentication request:
-
- In the authentication request:
- Specify
response_type = id_token token
. - Specify
redirect_uri = http://localhost:8090/implicit_flow_callback
- Specify
- In the authentication request:
-
- In the authentication request:
- Specify
response_type = code id_token
. - Specify
redirect_uri = http://localhost:8090/implicit_flow_callback
- Specify
- In the authentication request:
-
Static client registration
- Register with the provider, making sure to specify the correct
redirect_uris
(seeclient.json
for Python and Java, or the Apache configuration). Store the generated credentials (client_id
andclient_secret
). - Refer to each implementation's documentation for instructions.
- Register with the provider, making sure to specify the correct
-
Dynamic client registration
- Refer to each implementation's documentation for instructions.
-
Request claims using the
scope
parameter- In the authentication request:
- Specify
scope = openid profile
- Specify
- Observe which claims are returned.
- Try logging in as a another user and again observe which claims are returned.
- In the authentication request:
-
Request claims using the
claims
parameter-
In the authentication request
-
Specify
response_type = code
. -
Specify the following in the claims request (pseudo-code):
{ "userinfo":{ "given_name":{ "essential":true }, "family_name":{ "essential":true }, "nickname":null }, "id_token":{ "email":{ "essential":true }, "phone_number":null } }
-
-
Observe which claims are returned and how they are returned (in the user info or in the ID token).
-
-
Request a certain behavior by the OP using
scope
values-
In the authentication request
- Specify
scope = openid who_am_i
- Specify
-
Observe what claims are returned and their values.
-
Try logging in as a another user and again observe which claims are returned.
-
- Request a signed UserInfo Response
- In the registration request:
- Specify
userinfo_signed_response_alg = RS256
- Specify
- Refer to each implementation's documentation for instructions on how to verify the signature.
- In the registration request: