From dafa8e383f458ea90db3a73a3ea9f9288d5da141 Mon Sep 17 00:00:00 2001 From: rishabhpoddar Date: Wed, 25 Oct 2023 13:36:28 +0530 Subject: [PATCH] fixes to oidc endpoint docs --- .../multi-tenancy/custom-provider.mdx | 10 ++++++---- .../sign-in-and-up/custom-providers.mdx | 6 +++--- .../multi-tenancy/custom-provider.mdx | 10 ++++++---- .../signup-form/custom-providers.mdx | 6 +++--- .../multi-tenancy/custom-provider.mdx | 10 ++++++---- .../signup-form/custom-providers.mdx | 6 +++--- 6 files changed, 27 insertions(+), 21 deletions(-) diff --git a/v2/thirdparty/common-customizations/multi-tenancy/custom-provider.mdx b/v2/thirdparty/common-customizations/multi-tenancy/custom-provider.mdx index 807d48749..15d5c1292 100644 --- a/v2/thirdparty/common-customizations/multi-tenancy/custom-provider.mdx +++ b/v2/thirdparty/common-customizations/multi-tenancy/custom-provider.mdx @@ -326,7 +326,7 @@ async function createTenant() { scope: ["email", "profile"] }], // highlight-start - oidcDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + oidcDiscoveryEndpoint: "https://example.com", // highlight-end authorizationEndpointQueryParams: { // optional "someKey1": "value1", @@ -372,7 +372,7 @@ func main() { }, }, // highlight-start - OIDCDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + OIDCDiscoveryEndpoint: "https://example.com", // highlight-end AuthorizationEndpointQueryParams: map[string]interface{}{ // optional "someKey1": "value1", @@ -418,7 +418,7 @@ async def some_func(): ), ], # highlight-start - oidc_discovery_endpoint="https://example.com/.well-known/openid-configuration", + oidc_discovery_endpoint="https://example.com", # highlight-end authorization_endpoint_query_params={ "someKey1": "value1", @@ -461,7 +461,7 @@ curl --location --request PUT '^{coreInjector_uri_without_quotes}//re "clientSecret": "...", "scope": ["email", "profile"], }], - "oidcDiscoveryEndpoint": "https://example.com/.well-known/openid-configuration", + "oidcDiscoveryEndpoint": "https://example.com", "authorizationEndpointQueryParams": { "someKey1": "value1", "someKey2": "value2" @@ -486,6 +486,8 @@ curl --location --request PUT '^{coreInjector_uri_without_quotes}//re - The `tenantId` is a unique ID that identifies the tenant for whom you want to add the custom provider. If not specified, it will add it for the `"public"` tenantId (which is the default one). +- Notice that `oidcDiscoveryEndpoint` doesn't have the `/.well-known/openid-configuration` appended to it. That's because our backend SDK adds this automatically, so you don't need to. + diff --git a/v2/thirdparty/common-customizations/sign-in-and-up/custom-providers.mdx b/v2/thirdparty/common-customizations/sign-in-and-up/custom-providers.mdx index 146be9bf6..68c13c206 100644 --- a/v2/thirdparty/common-customizations/sign-in-and-up/custom-providers.mdx +++ b/v2/thirdparty/common-customizations/sign-in-and-up/custom-providers.mdx @@ -321,7 +321,7 @@ SuperTokens.init({ scope: ["profile", "email"] }], // highlight-start - oidcDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + oidcDiscoveryEndpoint: "https://example.com", // highlight-end authorizationEndpointQueryParams: { "someKey1": "value1", @@ -373,7 +373,7 @@ func main() { }, }, // highlight-start - OIDCDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + OIDCDiscoveryEndpoint: "https://example.com", // highlight-end AuthorizationEndpointQueryParams: map[string]interface{}{ // optional "someKey1": "value1", @@ -426,7 +426,7 @@ init( scope=["email", "profile"], ), ], - oidc_discovery_endpoint="https://example.com/.well-known/openid-configuration", + oidc_discovery_endpoint="https://example.com", authorization_endpoint_query_params={ "someKey1": "value1", "someKey2": None, diff --git a/v2/thirdpartyemailpassword/common-customizations/multi-tenancy/custom-provider.mdx b/v2/thirdpartyemailpassword/common-customizations/multi-tenancy/custom-provider.mdx index 807d48749..15d5c1292 100644 --- a/v2/thirdpartyemailpassword/common-customizations/multi-tenancy/custom-provider.mdx +++ b/v2/thirdpartyemailpassword/common-customizations/multi-tenancy/custom-provider.mdx @@ -326,7 +326,7 @@ async function createTenant() { scope: ["email", "profile"] }], // highlight-start - oidcDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + oidcDiscoveryEndpoint: "https://example.com", // highlight-end authorizationEndpointQueryParams: { // optional "someKey1": "value1", @@ -372,7 +372,7 @@ func main() { }, }, // highlight-start - OIDCDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + OIDCDiscoveryEndpoint: "https://example.com", // highlight-end AuthorizationEndpointQueryParams: map[string]interface{}{ // optional "someKey1": "value1", @@ -418,7 +418,7 @@ async def some_func(): ), ], # highlight-start - oidc_discovery_endpoint="https://example.com/.well-known/openid-configuration", + oidc_discovery_endpoint="https://example.com", # highlight-end authorization_endpoint_query_params={ "someKey1": "value1", @@ -461,7 +461,7 @@ curl --location --request PUT '^{coreInjector_uri_without_quotes}//re "clientSecret": "...", "scope": ["email", "profile"], }], - "oidcDiscoveryEndpoint": "https://example.com/.well-known/openid-configuration", + "oidcDiscoveryEndpoint": "https://example.com", "authorizationEndpointQueryParams": { "someKey1": "value1", "someKey2": "value2" @@ -486,6 +486,8 @@ curl --location --request PUT '^{coreInjector_uri_without_quotes}//re - The `tenantId` is a unique ID that identifies the tenant for whom you want to add the custom provider. If not specified, it will add it for the `"public"` tenantId (which is the default one). +- Notice that `oidcDiscoveryEndpoint` doesn't have the `/.well-known/openid-configuration` appended to it. That's because our backend SDK adds this automatically, so you don't need to. + diff --git a/v2/thirdpartyemailpassword/common-customizations/signup-form/custom-providers.mdx b/v2/thirdpartyemailpassword/common-customizations/signup-form/custom-providers.mdx index 146be9bf6..68c13c206 100644 --- a/v2/thirdpartyemailpassword/common-customizations/signup-form/custom-providers.mdx +++ b/v2/thirdpartyemailpassword/common-customizations/signup-form/custom-providers.mdx @@ -321,7 +321,7 @@ SuperTokens.init({ scope: ["profile", "email"] }], // highlight-start - oidcDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + oidcDiscoveryEndpoint: "https://example.com", // highlight-end authorizationEndpointQueryParams: { "someKey1": "value1", @@ -373,7 +373,7 @@ func main() { }, }, // highlight-start - OIDCDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + OIDCDiscoveryEndpoint: "https://example.com", // highlight-end AuthorizationEndpointQueryParams: map[string]interface{}{ // optional "someKey1": "value1", @@ -426,7 +426,7 @@ init( scope=["email", "profile"], ), ], - oidc_discovery_endpoint="https://example.com/.well-known/openid-configuration", + oidc_discovery_endpoint="https://example.com", authorization_endpoint_query_params={ "someKey1": "value1", "someKey2": None, diff --git a/v2/thirdpartypasswordless/common-customizations/multi-tenancy/custom-provider.mdx b/v2/thirdpartypasswordless/common-customizations/multi-tenancy/custom-provider.mdx index 807d48749..15d5c1292 100644 --- a/v2/thirdpartypasswordless/common-customizations/multi-tenancy/custom-provider.mdx +++ b/v2/thirdpartypasswordless/common-customizations/multi-tenancy/custom-provider.mdx @@ -326,7 +326,7 @@ async function createTenant() { scope: ["email", "profile"] }], // highlight-start - oidcDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + oidcDiscoveryEndpoint: "https://example.com", // highlight-end authorizationEndpointQueryParams: { // optional "someKey1": "value1", @@ -372,7 +372,7 @@ func main() { }, }, // highlight-start - OIDCDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + OIDCDiscoveryEndpoint: "https://example.com", // highlight-end AuthorizationEndpointQueryParams: map[string]interface{}{ // optional "someKey1": "value1", @@ -418,7 +418,7 @@ async def some_func(): ), ], # highlight-start - oidc_discovery_endpoint="https://example.com/.well-known/openid-configuration", + oidc_discovery_endpoint="https://example.com", # highlight-end authorization_endpoint_query_params={ "someKey1": "value1", @@ -461,7 +461,7 @@ curl --location --request PUT '^{coreInjector_uri_without_quotes}//re "clientSecret": "...", "scope": ["email", "profile"], }], - "oidcDiscoveryEndpoint": "https://example.com/.well-known/openid-configuration", + "oidcDiscoveryEndpoint": "https://example.com", "authorizationEndpointQueryParams": { "someKey1": "value1", "someKey2": "value2" @@ -486,6 +486,8 @@ curl --location --request PUT '^{coreInjector_uri_without_quotes}//re - The `tenantId` is a unique ID that identifies the tenant for whom you want to add the custom provider. If not specified, it will add it for the `"public"` tenantId (which is the default one). +- Notice that `oidcDiscoveryEndpoint` doesn't have the `/.well-known/openid-configuration` appended to it. That's because our backend SDK adds this automatically, so you don't need to. + diff --git a/v2/thirdpartypasswordless/common-customizations/signup-form/custom-providers.mdx b/v2/thirdpartypasswordless/common-customizations/signup-form/custom-providers.mdx index 146be9bf6..68c13c206 100644 --- a/v2/thirdpartypasswordless/common-customizations/signup-form/custom-providers.mdx +++ b/v2/thirdpartypasswordless/common-customizations/signup-form/custom-providers.mdx @@ -321,7 +321,7 @@ SuperTokens.init({ scope: ["profile", "email"] }], // highlight-start - oidcDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + oidcDiscoveryEndpoint: "https://example.com", // highlight-end authorizationEndpointQueryParams: { "someKey1": "value1", @@ -373,7 +373,7 @@ func main() { }, }, // highlight-start - OIDCDiscoveryEndpoint: "https://example.com/.well-known/openid-configuration", + OIDCDiscoveryEndpoint: "https://example.com", // highlight-end AuthorizationEndpointQueryParams: map[string]interface{}{ // optional "someKey1": "value1", @@ -426,7 +426,7 @@ init( scope=["email", "profile"], ), ], - oidc_discovery_endpoint="https://example.com/.well-known/openid-configuration", + oidc_discovery_endpoint="https://example.com", authorization_endpoint_query_params={ "someKey1": "value1", "someKey2": None,