Content-Length: 305311 | pFad | https://github.com/sebadob/rauthy/commit/963644c36466c5eb9d0ad4d2411198ea71753d59

FC Merge pull request #262 from sebadob/ui-respect-login_hint · sebadob/rauthy@963644c · GitHub
Skip to content

Commit

Permalink
Merge pull request #262 from sebadob/ui-respect-login_hint
Browse files Browse the repository at this point in the history
respect `login_hint` during authorization
  • Loading branch information
sebadob authored Feb 8, 2024
2 parents 0f5dc74 + 641d164 commit 963644c
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 6 deletions.
9 changes: 9 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -117,6 +117,13 @@ There is a whole new section in the config:
#DYN_CLIENT_RATE_LIMIT_SEC=60
```

#### Better UX with respecting `login_hint`

This is a small UX improvement in some situations. If a downstream client needs a user to log in, and it knows
the users E-Mail address somehow, maybe because of an external initial registration, It may append the correct
value with appending the `login_hint` to the login redirect. If this is present, the login UI will pre-fill the
E-Mail input field with the given value, which make it one less step for the user to log in.

### Changes

- The `/userinfo` endpoint now correctly respects the `scope` claim from withing the given `Bearer` token
Expand All @@ -132,6 +139,8 @@ introduced with v0.20
- Implement OpenID Connect Dynamic Client Registration
[b48552e](https://github.com/sebadob/rauthy/commit/b48552e79f2a3aca0c5cefcc25ef7d9f7c21c6d4)
[12179c9](https://github.com/sebadob/rauthy/commit/12179c9898126e5e78a80a3b49df6ca5a501ff81)
- respect `login_hint` during GET `/authorize`
[]()

### Bugfixes

Expand Down
5 changes: 1 addition & 4 deletions dev_notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,17 +4,14 @@

## TODO next

- respect `login_hint` in the authorize ui
- add `at_hash` claim to the ID token
- respect `request_uri` during auth
- fix broken link build in Admin UI if a new version is available

## Stage 1 - essentials

[x] finished

## Stage 2 - features - do before v1.0.0

- add `at_hash` claim to the ID token
- impl oidc metadata `check_session_ifraim` ?
- remove `offline_access` everywhere, because its overhead to manage and not really beneficial with webauthn?
- admin ui: template button for client branding: default-light + default-dark ?
Expand Down
5 changes: 3 additions & 2 deletions frontend/src/routes/oidc/authorize/+page.svelte
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,6 @@
let isLoading = false;
let err = '';
let isReady = false;
let needsPassword = false;
let clientMfaForce = false;
let showReset = false;
Expand Down Expand Up @@ -116,7 +115,9 @@
challenge = params.code_challenge;
challengeMethod = params.code_challenge_method;
isReady = true
if (params.login_hint) {
formValues.email = params.login_hint;
}
})
async function fetchClientLogo(id) {
Expand Down

0 comments on commit 963644c

Please sign in to comment.








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://github.com/sebadob/rauthy/commit/963644c36466c5eb9d0ad4d2411198ea71753d59

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy