You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/reactive/oauth2/login/logout.adoc
+1-1
Original file line number
Diff line number
Diff line change
@@ -173,7 +173,7 @@ open fun filterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
173
173
174
174
And that's it!
175
175
176
-
This will stand up the endpoint `/logout/connect/back-channel/+{registrationId}` which the OIDC Provider can request to invalidate a given session of an end user in your application.
176
+
This will stand up the endpoint `+/logout/connect/back-channel/{registrationId}+` which the OIDC Provider can request to invalidate a given session of an end user in your application.
177
177
178
178
[NOTE]
179
179
`oidcLogout` requires that `oauth2Login` also be configured.
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/servlet/oauth2/login/advanced.adoc
-109
Original file line number
Diff line number
Diff line change
@@ -929,114 +929,5 @@ For MAC-based algorithms (such as `HS256`, `HS384`, or `HS512`), the `client-sec
929
929
If more than one `ClientRegistration` is configured for OpenID Connect 1.0 Authentication, the JWS algorithm resolver may evaluate the provided `ClientRegistration` to determine which algorithm to return.
930
930
====
931
931
932
-
933
-
[[oauth2login-advanced-oidc-logout]]
934
-
== OpenID Connect 1.0 Logout
935
-
936
-
OpenID Connect Session Management 1.0 allows the ability to log out the end user at the Provider by using the Client.
937
-
One of the strategies available is https://openid.net/specs/openid-connect-rpinitiated-1_0.html[RP-Initiated Logout].
938
-
939
-
If the OpenID Provider supports both Session Management and https://openid.net/specs/openid-connect-discovery-1_0.html[Discovery], the client can obtain the `end_session_endpoint` `URL` from the OpenID Provider's https://openid.net/specs/openid-connect-session-1_0.html#OPMetadata[Discovery Metadata].
940
-
You can do so by configuring the `ClientRegistration` with the `issuer-uri`, as follows:
941
-
942
-
[source,yaml]
943
-
----
944
-
spring:
945
-
security:
946
-
oauth2:
947
-
client:
948
-
registration:
949
-
okta:
950
-
client-id: okta-client-id
951
-
client-secret: okta-client-secret
952
-
...
953
-
provider:
954
-
okta:
955
-
issuer-uri: https://dev-1234.oktapreview.com
956
-
----
957
-
958
-
Also, you can configure `OidcClientInitiatedLogoutSuccessHandler`, which implements RP-Initiated Logout, as follows:
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/servlet/oauth2/login/logout.adoc
+1-1
Original file line number
Diff line number
Diff line change
@@ -172,7 +172,7 @@ open fun filterChain(http: HttpSecurity): SecurityFilterChain {
172
172
173
173
And that's it!
174
174
175
-
This will stand up the endpoint `/logout/connect/back-channel/+{registrationId}` which the OIDC Provider can request to invalidate a given session of an end user in your application.
175
+
This will stand up the endpoint `+/logout/connect/back-channel/{registrationId}+` which the OIDC Provider can request to invalidate a given session of an end user in your application.
176
176
177
177
[NOTE]
178
178
`oidcLogout` requires that `oauth2Login` also be configured.
0 commit comments