Commit Graph

14 Commits

Author SHA1 Message Date
Nikos Sklikas 5215d2482a
feat: implement RFC 8628 (#3912)
This patch introduces the OAuth 2.0 Device Authorization Grant to Ory
Hydra. The OAuth 2.0 device authorization grant is designed for
Internet-connected devices that either lack a browser to perform a
user-agent-based authorization or are input constrained to the extent
that requiring the user to input text in order to authenticate during
the authorization flow is impractical. It enables OAuth clients on such
devices (like smart TVs, media consoles, digital picture frames, and
printers) to obtain user authorization to access protected resources by
using a user agent on a separate device.

The OAuth 2.0 Device Authorization Grant may also become relevant for AI
Agent authentication flows and is generally an amazing step and
innovation for this project.

A very special thanks goes to @nsklikas from
[Canonical](https://canonical.com), @supercairos from
[shadow.tech](https://shadow.tech) and @BuzzBumbleBee.

For more details, please check out the documentation
(https://github.com/ory/docs/pull/2026)

To implement this feature, you will need to implement two additional
screens in your login and consent application. A reference
implementation can be found
[here](99ca6ad544/src/routes/device.ts).

Closes #3851
Closes #3252
Closes #3230
Closes #2416
2025-02-26 13:41:41 +01:00
Kevin Goslar d768cf6580
docs: standardize license headers (#3216) 2022-11-03 10:10:12 -05:00
aeneasr 82ba44672a chore: update formatter and formatting 2022-09-07 08:10:31 +02:00
aeneasr 4002224439 refactor(client): make OAuth2 Client IDs system-chosen and immutable
BREAKING CHANGE: To improve security and scalability (in particular sharding), OAuth 2.0 Client IDs can no longer be chosen but are always assigned a random generated UUID V4. OAuth 2.0 Clients created with custom IDs before the v2.0 release will continue working with their legacy Client ID in Ory Hydra v2.x.

Additionally, the `hydra create client` command no longer supports flag `--id` and flag `--callbacks` has been renamed to `--redirect-uris`.

Closes #2911
2022-09-07 08:10:31 +02:00
Grant Zvolský 9544c03a3b
feat: custom client token ttl (#3206)
This change introduces a new endpoint that allows you to control how long client tokens last. Now you can configure the lifespan for each valid combination of Client, GrantType, and TokenType.

See #3157

Co-authored-by: aeneasr <3372410+aeneasr@users.noreply.github.com>
Co-authored-by: Andreas Bucksteeg <andreas@bucksteeg.de>
2022-07-28 21:12:09 +02:00
aeneasr 2aa09804f6 test: use cypress fetchers 2021-03-24 11:24:04 +01:00
Stepan Rakitin bc349f1fba
feat: refresh token reuse detection (#2383)
This patch adds support for Refresh Token reuse Detection introduced by https://github.com/ory/fosite/pull/567. Ory Hydra's persister no longer deletes refresh tokens when using them, but instead deactivates them - similar to how authorization codes work.

Closes #2022
2021-03-23 10:35:19 +01:00
zepatrik 98d1a8cd7b ci: pin exact prettier version 2020-11-17 17:26:09 +01:00
Patrik e972bcbcb9
chore: apply ory-prettier-styles to cypress tests (#2179) 2020-11-17 14:15:22 +01:00
hackerman af18bdbca7
fix(consent): login and consent error handling (#1799)
A regression was introduces in 1.4.2 which caused the error handling to misbehave
and show wrong error messages as shown in #1791

Closes #1791
2020-04-16 13:11:39 +02:00
hackerman 33acfa8d18
consent: Resolve nil pointer panic in logout flow (#1418)
Closes #1403

Signed-off-by: aeneasr <aeneas@ory.sh>
2019-05-02 15:10:42 +02:00
aeneasr 9e829a90aa lint: Format javascript test code
Signed-off-by: aeneasr <aeneas@ory.sh>
2019-04-27 10:45:49 +02:00
hackerman a4a75d4368
Improve e2e test performance (#1392)
Closes #1389

Signed-off-by: aeneasr <aeneas@ory.sh>
2019-04-26 18:39:37 +02:00
hackerman bbeee653de
Implement OpenID Connect Front-/Backchannel logout (#1376)
Closes #1368 
Closes #1004 
Closes #834

Signed-off-by: aeneasr <aeneas@ory.sh>
2019-04-25 23:17:57 +02:00