You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.Learn more about bidirectional Unicode characters
To enable the `OpenID Connect Discovery`_, the ``OidcUserInfoTokenHandler``
requires the ``symfony/cache`` package to store the OIDC configuration in
cache. If you haven't installed it yet, run this command:
.. code-block:: terminal
$ composer require symfony/cache
Then, configure the ``base_uri`` and ``discovery`` keys:
.. configuration-block::
.. code-block:: yaml
# config/packages/security.yaml
security:
firewalls:
main:
access_token:
token_handler:
oidc_user_info:
base_uri: https://www.example.com/realms/demo/
discovery:
cache: cache.app
Check failure on line 437 in security/access_token.rst
View workflow job for this annotation
GitHub Actions/ Code Blocks
[Cache Warmup] In ArrayNode.php line 304: Unrecognized option "discovery" under "security.firewalls.main.access_token .token_handler.oidc_user_info". Available options are "base_uri", "claim", "client".
Following the `OpenID Connect Specification`_, the ``sub`` claim is used as user
identifier by default. To use another claim, specify it on the configuration:
Expand DownExpand Up
@@ -625,6 +691,84 @@
The support of multiple algorithms to sign the JWS was introduced in Symfony 7.1.
In previous versions, only the ``ES256`` algorithm was supported.
To enable the `OpenID Connect Discovery`_, the ``OidcTokenHandler``
requires the ``symfony/cache`` package to store the OIDC configuration in
cache. If you haven't installed it yet, run this command:
.. code-block:: terminal
$ composer require symfony/cache
Then, you can remove the ``keyset`` configuration key (it will be imported from
the OpenID Connect Discovery), and configure the ``discovery`` key:
.. configuration-block::
.. code-block:: yaml
# config/packages/security.yaml
security:
firewalls:
main:
access_token:
token_handler:
oidc:
claim: email
algorithms: ['ES256', 'RS256']
audience: 'api-example'
issuers: ['https://oidc.example.com']
discovery:
base_uri: https://www.example.com/realms/demo/
cache: cache.app
Check failure on line 722 in security/access_token.rst
View workflow job for this annotation
GitHub Actions/ Code Blocks
[Cache Warmup] In ArrayNode.php line 304: Unrecognized option "discovery" under "security.firewalls.main.access_token .token_handler.oidc". Available options are "algorithm", "algorithms", "aud ience", "claim", "encryption", "issuers", "key", "keyset".
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.