oidc
Here are 604 public repositories matching this topic...
Description 🐜
With the removal of clientMaxAge and keepAlive in favor of refetchInterval, every time a tab is switched, the session gets revalidated, thus updating a session state in SessionProvider which then causes to rerender all components using useSession.
Is it possible to disable this "revalidation" upon window refocusing?
Thanks in advance.
Is this a bug in your own
-
Updated
Dec 18, 2021 - Go
-
Updated
Dec 13, 2021 - Python
-
Updated
Dec 13, 2021 - Python
-
Updated
Dec 13, 2021 - JavaScript
-
Updated
Dec 13, 2021 - JavaScript
-
Updated
Dec 18, 2021 - Python
-
Updated
Dec 16, 2021 - C
-
Updated
Dec 13, 2021 - C#
Describe the bug
If the environment (in my case the stage environment) is not setup as a a secure origin the library break up cause of the crypto library is not in window object
To Reproduce
Steps to reproduce the behavior:
- A server work on http that is setup as 'insecure origin'
- Start the login sequence
Expected behavior
Warning on library loading that check secure or
-
Updated
Dec 17, 2021 - Go
-
Updated
Nov 12, 2021 - TypeScript
Describe the issue:
The links not show hover states on hover on the getting started page.
How to reproduce:
- Navigate to getting started page
- hover over any link
Expected behavior:
Should indicate hover state for links
-
Updated
Dec 17, 2021 - JavaScript
-
Updated
Dec 16, 2021 - Java
-
Updated
Dec 15, 2021 - C
-
Updated
Dec 6, 2021 - TypeScript
-
Updated
Dec 16, 2021 - C#
-
Updated
Dec 17, 2021 - Go
-
Updated
Mar 4, 2021 - Go
-
Updated
May 28, 2020
- Create documentation for how to configure KeyCloak with Pinniped as an OIDC IDP
- Explore if we want to add KeyCloak to CI (probably in addition to Dex, to give us better OIDC coverage with a "real" IDP)
-
Updated
Dec 13, 2021 - JavaScript
-
Updated
Nov 21, 2021 - Go
-
Updated
Jun 8, 2021 - C#
-
Updated
Jul 8, 2021
-
Updated
Sep 21, 2021 - JavaScript
Improve this page
Add a description, image, and links to the oidc topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the oidc topic, visit your repo's landing page and select "manage topics."
Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit