mirror of
https://github.com/element-hq/synapse.git
synced 2024-11-24 10:35:46 +03:00
deploy: b7af076ab5
This commit is contained in:
parent
bc87b010c8
commit
e7095c0c6e
4 changed files with 14 additions and 2 deletions
|
@ -6596,6 +6596,10 @@ not included in <code>scopes</code>. Set to <code>userinfo_endpoint</code> to al
|
||||||
userinfo endpoint.</p>
|
userinfo endpoint.</p>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
|
<p><code>additional_authorization_parameters</code>: String to string dictionary that will be passed as
|
||||||
|
additional parameters to the authorization grant URL.</p>
|
||||||
|
</li>
|
||||||
|
<li>
|
||||||
<p><code>allow_existing_users</code>: set to true to allow a user logging in via OIDC to
|
<p><code>allow_existing_users</code>: set to true to allow a user logging in via OIDC to
|
||||||
match a pre-existing account instead of failing. This could be used if
|
match a pre-existing account instead of failing. This could be used if
|
||||||
switching from password logins to OIDC. Defaults to false.</p>
|
switching from password logins to OIDC. Defaults to false.</p>
|
||||||
|
@ -6727,6 +6731,8 @@ claim MUST contain "admin".</p>
|
||||||
token_endpoint: "https://accounts.example.com/oauth2/token"
|
token_endpoint: "https://accounts.example.com/oauth2/token"
|
||||||
userinfo_endpoint: "https://accounts.example.com/userinfo"
|
userinfo_endpoint: "https://accounts.example.com/userinfo"
|
||||||
jwks_uri: "https://accounts.example.com/.well-known/jwks.json"
|
jwks_uri: "https://accounts.example.com/.well-known/jwks.json"
|
||||||
|
additional_authorization_parameters:
|
||||||
|
acr_values: 2fa
|
||||||
skip_verification: true
|
skip_verification: true
|
||||||
enable_registration: true
|
enable_registration: true
|
||||||
user_mapping_provider:
|
user_mapping_provider:
|
||||||
|
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
|
@ -2982,6 +2982,10 @@ not included in <code>scopes</code>. Set to <code>userinfo_endpoint</code> to al
|
||||||
userinfo endpoint.</p>
|
userinfo endpoint.</p>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
|
<p><code>additional_authorization_parameters</code>: String to string dictionary that will be passed as
|
||||||
|
additional parameters to the authorization grant URL.</p>
|
||||||
|
</li>
|
||||||
|
<li>
|
||||||
<p><code>allow_existing_users</code>: set to true to allow a user logging in via OIDC to
|
<p><code>allow_existing_users</code>: set to true to allow a user logging in via OIDC to
|
||||||
match a pre-existing account instead of failing. This could be used if
|
match a pre-existing account instead of failing. This could be used if
|
||||||
switching from password logins to OIDC. Defaults to false.</p>
|
switching from password logins to OIDC. Defaults to false.</p>
|
||||||
|
@ -3113,6 +3117,8 @@ claim MUST contain "admin".</p>
|
||||||
token_endpoint: "https://accounts.example.com/oauth2/token"
|
token_endpoint: "https://accounts.example.com/oauth2/token"
|
||||||
userinfo_endpoint: "https://accounts.example.com/userinfo"
|
userinfo_endpoint: "https://accounts.example.com/userinfo"
|
||||||
jwks_uri: "https://accounts.example.com/.well-known/jwks.json"
|
jwks_uri: "https://accounts.example.com/.well-known/jwks.json"
|
||||||
|
additional_authorization_parameters:
|
||||||
|
acr_values: 2fa
|
||||||
skip_verification: true
|
skip_verification: true
|
||||||
enable_registration: true
|
enable_registration: true
|
||||||
user_mapping_provider:
|
user_mapping_provider:
|
||||||
|
|
Loading…
Reference in a new issue