@ksvedal/docs 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +74 -0
- package/dist/Starthjelp-CDnMsPRF.js +6 -0
- package/dist/Starthjelp-DTDqsiPb.js +6 -0
- package/dist/_baseUniq-FW_jgYGR.js +477 -0
- package/dist/access_policy-BV-cRgLX.js +17 -0
- package/dist/access_policy-pBOJMSEK.js +17 -0
- package/dist/access_token_lifetime-6ypKk6LU.js +31 -0
- package/dist/access_token_lifetime-CVau9UC3.js +31 -0
- package/dist/allowed_grant_types-BrnsQvWi.js +101 -0
- package/dist/allowed_grant_types-ovkxJeQq.js +101 -0
- package/dist/application_type-BAESO1T4.js +36 -0
- package/dist/application_type-BtouPPrt.js +39 -0
- package/dist/arc-zSbgd3Dl.js +83 -0
- package/dist/architecture-U656AL7Q-bG73RCfJ.js +5 -0
- package/dist/architectureDiagram-VXUJARFQ-DbJ1yKpS.js +4668 -0
- package/dist/authentication_method-B28p58-a.js +43 -0
- package/dist/authentication_method-D8EwmEki.js +43 -0
- package/dist/authorization_lifetime-CfhrWQ9Y.js +39 -0
- package/dist/authorization_lifetime-DrFRbscQ.js +39 -0
- package/dist/backchannel_logout_uri-BTceN7xq.js +33 -0
- package/dist/backchannel_logout_uri-CBdktUL7.js +33 -0
- package/dist/blockDiagram-VD42YOAC-CmPMJI6H.js +2265 -0
- package/dist/breadcrumbs.json +1202 -0
- package/dist/c4Diagram-YG6GDRKO-BtTnslb7.js +1581 -0
- package/dist/channel-B9C38GUl.js +5 -0
- package/dist/chunk-4BX2VUAB-BLcImAIn.js +9 -0
- package/dist/chunk-55IACEB6-Cd_NYMQ6.js +8 -0
- package/dist/chunk-B4BG7PRW-C5mt8tWU.js +1376 -0
- package/dist/chunk-DI55MBZ5-BliqH_si.js +1382 -0
- package/dist/chunk-FMBD7UC4-D8OxNP20.js +19 -0
- package/dist/chunk-QN33PNHL-DBPrGAkF.js +20 -0
- package/dist/chunk-QZHKN3VN-Ce2k3n1F.js +15 -0
- package/dist/chunk-TZMSLE5B-BB3w_n2J.js +64 -0
- package/dist/classDiagram-2ON5EDUG-BJg1PJs9.js +16 -0
- package/dist/classDiagram-v2-WZHVMYZB-BJg1PJs9.js +16 -0
- package/dist/client_types-BmacnRwO.js +17 -0
- package/dist/client_types-Cu_f02j7.js +17 -0
- package/dist/clone-DZF-mLM1.js +8 -0
- package/dist/components/Docs.d.ts +5 -0
- package/dist/components/DocsBreadcrumbs.d.ts +10 -0
- package/dist/components/DocsErrorBoundary.d.ts +21 -0
- package/dist/components/DocsPage.d.ts +10 -0
- package/dist/components/DocsSearch.d.ts +12 -0
- package/dist/components/DocsViewer.d.ts +11 -0
- package/dist/components/index.d.ts +6 -0
- package/dist/components/useDocsStyles.d.ts +1 -0
- package/dist/cose-bilkent-S5V4N54A-xEniAY-c.js +2608 -0
- package/dist/cytoscape.esm-CjI2IsL8.js +18735 -0
- package/dist/dagre-6UL2VRFP-DWEj74f8.js +446 -0
- package/dist/defaultLocale-BgPVtth8.js +171 -0
- package/dist/delegation_source-B8L65LAZ.js +17 -0
- package/dist/delegation_source-DBE0sh58.js +17 -0
- package/dist/diagram-PSM6KHXK-Z3KtWXiy.js +533 -0
- package/dist/diagram-QEK2KX5R-BVA9QmB8.js +221 -0
- package/dist/diagram-S2PKOQOG-BOmc_fL6.js +143 -0
- package/dist/docs/folder.d.ts +12 -0
- package/dist/docs/types.d.ts +12 -0
- package/dist/entraid-CPkATiHs.js +6 -0
- package/dist/entraid-CSwp8dMQ.js +6 -0
- package/dist/erDiagram-Q2GNP2WA-Blro_6F2.js +842 -0
- package/dist/faq-CqjYqwL1.js +8 -0
- package/dist/faq-TqD11_1a.js +8 -0
- package/dist/flowDiagram-NV44I4VS-BN9iLCEi.js +1627 -0
- package/dist/frontchannel_logout_uri-Bt6bvoBs.js +36 -0
- package/dist/frontchannel_logout_uri-DRGyFXRl.js +36 -0
- package/dist/ganttDiagram-JELNMOA3-CXLPJQlh.js +2670 -0
- package/dist/general--WqS-xp8.js +89 -0
- package/dist/general-B37q4SsA.js +63 -0
- package/dist/general-BCOYLf6V.js +152 -0
- package/dist/general-CQFRRoeE.js +63 -0
- package/dist/general-Dk7lWiBC.js +152 -0
- package/dist/general-QQfgnjEE.js +89 -0
- package/dist/gitGraph-F6HP7TQM-ChFlbGFG.js +5 -0
- package/dist/gitGraphDiagram-NY62KEGX-DXSPVlhd.js +712 -0
- package/dist/graph-dALvSPTP.js +381 -0
- package/dist/index-D_FT2Td-.js +25338 -0
- package/dist/index.d.ts +2 -0
- package/dist/index.js +9 -0
- package/dist/info-NVLQJR56-BSQ5ueiP.js +5 -0
- package/dist/infoDiagram-WHAUD3N6-D0hbJwWb.js +24 -0
- package/dist/init-DjUOC4st.js +16 -0
- package/dist/integration_guide-BXkM8zJ-.js +7 -0
- package/dist/integration_guide-CLABphnS.js +313 -0
- package/dist/integration_guide-Ci8Nz8oL.js +313 -0
- package/dist/integration_guide-Ct8RYoMV.js +6 -0
- package/dist/integration_guide-DWfjt6Qk.js +6 -0
- package/dist/integration_guide-DrKTpPnR.js +6 -0
- package/dist/journeyDiagram-XKPGCS4Q-DTU9EVLJ.js +834 -0
- package/dist/kanban-definition-3W4ZIXB7-CcKx9EnU.js +721 -0
- package/dist/katex-C6SjTJMZ.js +11690 -0
- package/dist/layout-DUskCdLZ.js +1441 -0
- package/dist/linear-RKbqvfvG.js +259 -0
- package/dist/mermaid-parser.core-C-16ojim.js +15189 -0
- package/dist/min-CsCJm_uR.js +38 -0
- package/dist/mindmap-definition-VGOIOE7T-LpgPu_oq.js +787 -0
- package/dist/on_behalf_of-EcHpNqmZ.js +36 -0
- package/dist/on_behalf_of-qrlvHfcG.js +36 -0
- package/dist/ordinal-DfAQgscy.js +61 -0
- package/dist/overview-Bw11cTNo.js +21 -0
- package/dist/overview-ZreyAEkN.js +21 -0
- package/dist/packet-BFZMPI3H-CwJrUCZn.js +5 -0
- package/dist/pie-7BOR55EZ-WUF72bRP.js +5 -0
- package/dist/pieDiagram-ADFJNKIX-BRjx2vS_.js +161 -0
- package/dist/pkce-BkSKWYmh.js +34 -0
- package/dist/pkce-C3U_jCxQ.js +33 -0
- package/dist/post_logout_redirect_uri-BSzuTRwg.js +33 -0
- package/dist/post_logout_redirect_uri-BnhzB1De.js +33 -0
- package/dist/pseudonymous_login-B3oa6s2f.js +17 -0
- package/dist/pseudonymous_login-x98obOlL.js +17 -0
- package/dist/quadrantDiagram-AYHSOK5B-BOwjGYKH.js +1024 -0
- package/dist/radar-NHE76QYJ-DRN4buPP.js +5 -0
- package/dist/redirect_uri-Cnlv_2rt.js +38 -0
- package/dist/redirect_uri-DgNidm8d.js +38 -0
- package/dist/refresh_token_lifetime-DCzCzIyu.js +34 -0
- package/dist/refresh_token_lifetime-QcGf0aOG.js +34 -0
- package/dist/refresh_token_usage-C2LdxQHa.js +33 -0
- package/dist/refresh_token_usage-DXI98e4O.js +33 -0
- package/dist/requirementDiagram-UZGBJVZJ-KRDecAgT.js +852 -0
- package/dist/sankeyDiagram-TZEHDZUN-MKxbwv35.js +810 -0
- package/dist/search-index.json +450 -0
- package/dist/sequenceDiagram-WL72ISMW-DEo0cUN3.js +2518 -0
- package/dist/sso-BuAlvelZ.js +79 -0
- package/dist/sso-DYMIpoUd.js +78 -0
- package/dist/stateDiagram-FKZM4ZOC-CaTGomRc.js +263 -0
- package/dist/stateDiagram-v2-4FDKWEC3-l4p7_3uG.js +16 -0
- package/dist/timeline-definition-IT6M3QCI-ChX0PfWC.js +799 -0
- package/dist/token_lifetimes-Cp22x6RM.js +17 -0
- package/dist/token_lifetimes-CwzcMEnb.js +17 -0
- package/dist/token_type-B8DCg80j.js +17 -0
- package/dist/token_type-C7Y04-Fc.js +17 -0
- package/dist/treemap-KMMF4GRG-DNEhU-LQ.js +5 -0
- package/dist/user_involvement-4nbn_fQ7.js +17 -0
- package/dist/user_involvement-COT572uK.js +17 -0
- package/dist/visibility-BSqCGXMv.js +17 -0
- package/dist/visibility-CidZ07d9.js +17 -0
- package/dist/xychartDiagram-PRI3JC2R-CBQAJ13t.js +1340 -0
- package/package.json +60 -0
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
const e = `# Authentication method
|
|
2
|
+
|
|
3
|
+
## Purpose
|
|
4
|
+
|
|
5
|
+
The authentication method specifies how a client identifies and authenticates itself to the authorization server when calling endpoints that require client authentication, typically the token endpoint.
|
|
6
|
+
|
|
7
|
+
This is particularly relevant for confidential clients, meaning clients that can protect keys or secrets in a responsible way.
|
|
8
|
+
|
|
9
|
+
## Technical behavior
|
|
10
|
+
|
|
11
|
+
The selected method determines which mechanism the client must use to prove its identity. Common mechanisms include:
|
|
12
|
+
|
|
13
|
+
- client secret
|
|
14
|
+
- signed client assertion
|
|
15
|
+
- other supported methods for client authentication
|
|
16
|
+
|
|
17
|
+
When \`private_key_jwt\` is used, the client authenticates itself by sending a signed JWT assertion. The authorization server validates the signature against the client's registered public key or corresponding key material.
|
|
18
|
+
|
|
19
|
+
### Why \`private_key_jwt\` is used
|
|
20
|
+
|
|
21
|
+
\`private_key_jwt\` is often used when stronger client authentication is desired than a shared secret can provide. This is a good fit for integrations where:
|
|
22
|
+
|
|
23
|
+
- key material can be managed securely
|
|
24
|
+
- key rotation is important
|
|
25
|
+
- a clearer separation is desired between client identity and shared password-based authentication
|
|
26
|
+
|
|
27
|
+
## Use in OIDC clients
|
|
28
|
+
|
|
29
|
+
### ID-porten
|
|
30
|
+
|
|
31
|
+
For OIDC clients against ID-porten, this is used to authenticate the client to the token endpoint after an authorization code has been received.
|
|
32
|
+
|
|
33
|
+
### Ansattporten
|
|
34
|
+
|
|
35
|
+
For OIDC clients against Ansattporten, the same principle applies as for ID-porten: the client must authenticate securely when exchanging a code for a token.
|
|
36
|
+
|
|
37
|
+
### Maskinporten
|
|
38
|
+
|
|
39
|
+
Maskinporten is normally not an end-user-based OIDC flow, but the same principle of strong client authentication is central there as well, especially when signing with organizational keys in machine-to-machine scenarios.
|
|
40
|
+
`;
|
|
41
|
+
export {
|
|
42
|
+
e as default
|
|
43
|
+
};
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
const e = `# Autentiseringsmetode
|
|
2
|
+
|
|
3
|
+
## Formål
|
|
4
|
+
|
|
5
|
+
Autentiseringsmetode angir hvordan en klient identifiserer og autentiserer seg overfor autorisasjonsserveren når den kaller endepunkter som krever klientautentisering, typisk token-endepunktet.
|
|
6
|
+
|
|
7
|
+
Dette er særlig relevant for konfidensielle klienter, altså klienter som kan beskytte nøkler eller hemmeligheter på en forsvarlig måte.
|
|
8
|
+
|
|
9
|
+
## Teknisk virkemåte
|
|
10
|
+
|
|
11
|
+
Valgt metode bestemmer hvilken mekanisme klienten skal bruke for å bevise sin identitet. Vanlige mekanismer er:
|
|
12
|
+
|
|
13
|
+
- klienthemmelighet
|
|
14
|
+
- signert klientassertion
|
|
15
|
+
- andre støttede metoder for klientautentisering
|
|
16
|
+
|
|
17
|
+
Når \`private_key_jwt\` brukes, autentiserer klienten seg ved å sende en signert JWT assertion. Autorisasjonsserveren validerer signaturen mot klientens registrerte offentlige nøkkel eller tilhørende nøkkelmateriale.
|
|
18
|
+
|
|
19
|
+
### Hvorfor \`private_key_jwt\` brukes
|
|
20
|
+
|
|
21
|
+
\`private_key_jwt\` brukes ofte når man ønsker sterkere klientautentisering enn delt hemmelighet kan gi. Dette passer godt i integrasjoner der:
|
|
22
|
+
|
|
23
|
+
- nøkkelmateriale kan forvaltes sikkert
|
|
24
|
+
- nøkkelrotasjon er viktig
|
|
25
|
+
- man ønsker tydeligere separasjon mellom klientidentitet og delt passordbasert autentisering
|
|
26
|
+
|
|
27
|
+
## Bruk i OIDC-klienter
|
|
28
|
+
|
|
29
|
+
### ID-porten
|
|
30
|
+
|
|
31
|
+
For OIDC-klienter mot ID-porten brukes dette for å autentisere klienten mot token-endepunktet etter at en autorisasjonskode er mottatt.
|
|
32
|
+
|
|
33
|
+
### Ansattporten
|
|
34
|
+
|
|
35
|
+
For OIDC-klienter mot Ansattporten gjelder samme prinsipp som for ID-porten: klienten må autentisere seg sikkert når kode byttes mot token.
|
|
36
|
+
|
|
37
|
+
### Maskinporten
|
|
38
|
+
|
|
39
|
+
Maskinporten er normalt ikke en sluttbrukerbasert OIDC-flyt, men tilsvarende prinsipp for sterk klientautentisering er sentralt også der, særlig ved signering med virksomhetsnøkler i maskin-til-maskin-scenarier.
|
|
40
|
+
`;
|
|
41
|
+
export {
|
|
42
|
+
e as default
|
|
43
|
+
};
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
const e = `# Autorisasjon levetid
|
|
2
|
+
|
|
3
|
+
## Formål
|
|
4
|
+
|
|
5
|
+
Autorisasjon levetid beskriver hvor lenge en autorisasjon eller autorisasjonsrelatert tilstand regnes som gyldig.
|
|
6
|
+
|
|
7
|
+
Den eksakte betydningen kan variere mellom implementasjoner, men handler normalt om levetiden på en godkjenning, samtykketilstand eller autorisasjonskontekst.
|
|
8
|
+
|
|
9
|
+
## Teknisk virkemåte
|
|
10
|
+
|
|
11
|
+
I en autorisasjonsflyt kan det finnes flere tidsavgrensede tilstander, for eksempel at:
|
|
12
|
+
|
|
13
|
+
- en bruker har gitt samtykke
|
|
14
|
+
- en klient har fått etablert en autorisert relasjon
|
|
15
|
+
- en pågående autorisasjonsprosess fortsatt er gyldig
|
|
16
|
+
|
|
17
|
+
Autorisasjon levetid bestemmer hvor lenge en slik tilstand kan videreføres før ny autorisering eller ny vurdering må skje.
|
|
18
|
+
|
|
19
|
+
### Viktig avgrensning
|
|
20
|
+
|
|
21
|
+
Dette er ikke nødvendigvis det samme som:
|
|
22
|
+
|
|
23
|
+
- levetiden på access token
|
|
24
|
+
- levetiden på refresh token
|
|
25
|
+
- lengden på en innloggingssesjon
|
|
26
|
+
|
|
27
|
+
## Bruk i OIDC-klienter
|
|
28
|
+
|
|
29
|
+
### ID-porten og Ansattporten
|
|
30
|
+
|
|
31
|
+
Dette kan være relevant i klienter der samtykke, autorisasjonsbeslutninger eller relasjoner mellom klient og bruker skal ha en definert varighet.
|
|
32
|
+
|
|
33
|
+
### Maskinporten
|
|
34
|
+
|
|
35
|
+
I Maskinporten-sammenheng vil tilsvarende vurderinger ofte være mer knyttet til delegasjon, tilgangsgrunnlag og tokenutstedelse enn til sluttbrukerbasert samtykke.
|
|
36
|
+
`;
|
|
37
|
+
export {
|
|
38
|
+
e as default
|
|
39
|
+
};
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
const n = `# Authorization lifetime
|
|
2
|
+
|
|
3
|
+
## Purpose
|
|
4
|
+
|
|
5
|
+
Authorization lifetime describes how long an authorization or authorization-related state is considered valid.
|
|
6
|
+
|
|
7
|
+
The exact meaning may vary between implementations, but it normally concerns the lifetime of an approval, consent state, or authorization context.
|
|
8
|
+
|
|
9
|
+
## Technical behavior
|
|
10
|
+
|
|
11
|
+
In an authorization flow there can be several time-limited states, for example that:
|
|
12
|
+
|
|
13
|
+
- a user has given consent
|
|
14
|
+
- a client has established an authorized relationship
|
|
15
|
+
- an ongoing authorization process is still valid
|
|
16
|
+
|
|
17
|
+
Authorization lifetime determines how long such a state can continue before a new authorization or a new assessment is required.
|
|
18
|
+
|
|
19
|
+
### Important distinction
|
|
20
|
+
|
|
21
|
+
This is not necessarily the same as:
|
|
22
|
+
|
|
23
|
+
- the lifetime of an access token
|
|
24
|
+
- the lifetime of a refresh token
|
|
25
|
+
- the length of a sign-in session
|
|
26
|
+
|
|
27
|
+
## Use in OIDC clients
|
|
28
|
+
|
|
29
|
+
### ID-porten and Ansattporten
|
|
30
|
+
|
|
31
|
+
This can be relevant in clients where consent, authorization decisions, or relationships between client and user should have a defined duration.
|
|
32
|
+
|
|
33
|
+
### Maskinporten
|
|
34
|
+
|
|
35
|
+
In a Maskinporten context, similar considerations will often be more closely related to delegation, access basis, and token issuance than to end-user-based consent.
|
|
36
|
+
`;
|
|
37
|
+
export {
|
|
38
|
+
n as default
|
|
39
|
+
};
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
const e = `# Backchannel logout URI
|
|
2
|
+
|
|
3
|
+
## Purpose
|
|
4
|
+
|
|
5
|
+
Backchannel logout URI is the address an authorization server uses to notify a client directly that a central session has ended.
|
|
6
|
+
|
|
7
|
+
This happens server-to-server, without involving the user's browser.
|
|
8
|
+
|
|
9
|
+
## Technical behavior
|
|
10
|
+
|
|
11
|
+
At logout, the authorization server can send a logout message to the client's backend. The client can then:
|
|
12
|
+
|
|
13
|
+
- identify the affected local session
|
|
14
|
+
- invalidate session state
|
|
15
|
+
- clean up the security context
|
|
16
|
+
|
|
17
|
+
### Why this is useful
|
|
18
|
+
|
|
19
|
+
Backchannel logout is often more robust than browser-based logout because it does not depend on browser policies, cookies, or iframe behavior.
|
|
20
|
+
|
|
21
|
+
## Use in OIDC clients
|
|
22
|
+
|
|
23
|
+
### ID-porten and Ansattporten
|
|
24
|
+
|
|
25
|
+
This is relevant for clients that maintain server-side sessions and need reliable coordinated logout.
|
|
26
|
+
|
|
27
|
+
### Maskinporten
|
|
28
|
+
|
|
29
|
+
This is normally not relevant in Maskinporten, since there is no interactive end-user session to coordinate.
|
|
30
|
+
`;
|
|
31
|
+
export {
|
|
32
|
+
e as default
|
|
33
|
+
};
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
const e = `# Backchannel logout URI
|
|
2
|
+
|
|
3
|
+
## Formål
|
|
4
|
+
|
|
5
|
+
Backchannel logout URI er adressen en autorisasjonsserver bruker for å varsle en klient direkte om at en sentral sesjon er avsluttet.
|
|
6
|
+
|
|
7
|
+
Dette skjer server-til-server, uten at brukerens nettleser er involvert.
|
|
8
|
+
|
|
9
|
+
## Teknisk virkemåte
|
|
10
|
+
|
|
11
|
+
Ved logout kan autorisasjonsserveren sende en logout-melding til klientens backend. Klienten kan da:
|
|
12
|
+
|
|
13
|
+
- identifisere berørt lokal sesjon
|
|
14
|
+
- ugyldiggjøre sesjonstilstand
|
|
15
|
+
- rydde opp i sikkerhetskontekst
|
|
16
|
+
|
|
17
|
+
### Hvorfor dette er nyttig
|
|
18
|
+
|
|
19
|
+
Backchannel logout er ofte mer robust enn nettleserbasert logout fordi den ikke er avhengig av nettleserpolicyer, cookies eller iframe-oppførsel.
|
|
20
|
+
|
|
21
|
+
## Bruk i OIDC-klienter
|
|
22
|
+
|
|
23
|
+
### ID-porten og Ansattporten
|
|
24
|
+
|
|
25
|
+
Dette er relevant for klienter som har server-side sesjoner og trenger pålitelig koordinert logout.
|
|
26
|
+
|
|
27
|
+
### Maskinporten
|
|
28
|
+
|
|
29
|
+
Dette er normalt ikke relevant i Maskinporten, siden det ikke er en interaktiv sluttbrukersesjon som skal samordnes.
|
|
30
|
+
`;
|
|
31
|
+
export {
|
|
32
|
+
e as default
|
|
33
|
+
};
|