oidc
Here are 660 public repositories matching this topic...
Description 📓
Middleware is calling getToken directly without providing any decode methods. By getToken() uses jwtDecrypt from jose package, and it will probably throws error when the JWT is not signed in the same way. It will throw error when we p
-
Updated
Mar 24, 2022 - Go
-
Updated
Mar 18, 2022 - Python
-
Updated
Mar 17, 2022 - Python
-
Updated
Mar 17, 2022 - JavaScript
-
Updated
Mar 27, 2022 - Python
-
Updated
Mar 10, 2022 - JavaScript
-
Updated
Mar 27, 2022 - Go
Describe the bug
If the environment (in my case the stage environment) is not setup as a a secure origin the library break up cause of the crypto library is not in window object
To Reproduce
Steps to reproduce the behavior:
- A server work on http that is setup as 'insecure origin'
- Start the login sequence
Expected behavior
Warning on library loading that check secure or
-
Updated
Mar 21, 2022 - C
-
Updated
Mar 25, 2022 - C#
-
Updated
Mar 15, 2022 - TypeScript
-
Updated
Mar 25, 2022 - JavaScript
Describe the issue:
The links not show hover states on hover on the getting started page.
How to reproduce:
- Navigate to getting started page
- hover over any link
Expected behavior:
Should indicate hover state for links
-
Updated
Mar 18, 2022 - Java
-
Updated
Mar 25, 2022 - Ruby
After creating a custom login policy, the active identity providers are still listed from default. Same ist for MFA and 2FA, ...
From the screenshots below, you can see that the new policy is loaded after creation and reset. But only the policy itself and not the identity providers and factors:


Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit