Directories
¶
| Path | Synopsis |
|---|---|
|
examples
|
|
|
authutil
Package authutil contains utilities to set up example authorization server using goidc.
|
Package authutil contains utilities to set up example authorization server using goidc. |
|
fapi1_op_mtls
command
Example fapi1_op_mtls demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with mTLS authentication.
|
Example fapi1_op_mtls demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with mTLS authentication. |
|
fapi1_op_mtls_jarm
command
Example fapi1_op_mtls_jarm demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with mTLS authentication and JARM.
|
Example fapi1_op_mtls_jarm demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with mTLS authentication and JARM. |
|
fapi1_op_mtls_par
command
Example fapi1_op_mtls_par demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with mTLS authentication and PAR.
|
Example fapi1_op_mtls_par demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with mTLS authentication and PAR. |
|
fapi1_op_mtls_par_jarm
command
Example fapi1_op_mtls_par_jarm demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with mTLS authentication and PAR and JARM.
|
Example fapi1_op_mtls_par_jarm demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with mTLS authentication and PAR and JARM. |
|
fapi1_op_private_key
command
Example fapi1_op_private_key demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with private key JWT authentication.
|
Example fapi1_op_private_key demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with private key JWT authentication. |
|
fapi1_op_private_key_jarm
command
Example fapi1_op_private_key_jarm demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with private key JWT authentication and JARM.
|
Example fapi1_op_private_key_jarm demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with private key JWT authentication and JARM. |
|
fapi1_op_private_key_par
command
Example fapi1_op_private_key_par demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with private key JWT authentication and PAR.
|
Example fapi1_op_private_key_par demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with private key JWT authentication and PAR. |
|
fapi1_op_private_key_par_jarm
command
Example fapi1_op_private_key_par_jarm demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with private key JWT authentication and PAR and JARM.
|
Example fapi1_op_private_key_par_jarm demonstrates the implementation of a FAPI1 Advanced Security Profile OpenID Provider with private key JWT authentication and PAR and JARM. |
|
fapi2_ms_op_jar
command
Example fapi2_ms_op_jar demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with JAR.
|
Example fapi2_ms_op_jar demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with JAR. |
|
fapi2_ms_op_jarm
command
Example fapi2_ms_op_jarm demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with JARM.
|
Example fapi2_ms_op_jarm demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with JARM. |
|
fapi2_rar
command
Example fapi2_rar demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with rich authorization requests.
|
Example fapi2_rar demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with rich authorization requests. |
|
fapi2_sp_op_mtls_dpop
command
Example fapi2_sp_op_mtls_dpop demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with mTLS authentication and DPoP tokens.
|
Example fapi2_sp_op_mtls_dpop demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with mTLS authentication and DPoP tokens. |
|
fapi2_sp_op_mtls_mtls
command
Example fapi2_sp_op_mtls_mtls demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with mTLS authentication and sender constrained tokens using TLS certificates.
|
Example fapi2_sp_op_mtls_mtls demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with mTLS authentication and sender constrained tokens using TLS certificates. |
|
fapi2_sp_op_private_key_dpop
command
Example fapi2_sp_op_private_key_dpop demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with private key JWT authentication and DPoP tokens.
|
Example fapi2_sp_op_private_key_dpop demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with private key JWT authentication and DPoP tokens. |
|
fapi2_sp_op_private_key_mtls
command
Example fapi2_sp_op_private_key_mtls demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with private key JWT authentication and sender constrained tokens using TLS certificates.
|
Example fapi2_sp_op_private_key_mtls demonstrates the implementation of a FAPI2 Security Profile OpenID Provider with private key JWT authentication and sender constrained tokens using TLS certificates. |
|
fapiciba
command
Example fapiciba demonstrates the implementation of an Authorization Server that complies with the FAPI CIBA specification.
|
Example fapiciba demonstrates the implementation of an Authorization Server that complies with the FAPI CIBA specification. |
|
federation
command
|
|
|
multitenancy
command
Example oidc demonstrates the implementation of an Authorization Server that complies with the OpenID Connect specifications.
|
Example oidc demonstrates the implementation of an Authorization Server that complies with the OpenID Connect specifications. |
|
oidc
command
Example oidc demonstrates the implementation of an Authorization Server that complies with the OpenID Connect specifications.
|
Example oidc demonstrates the implementation of an Authorization Server that complies with the OpenID Connect specifications. |
|
ssf
command
Example ssf demonstrates the implementation of an Authorization Server that supports Shared Signals Framework (SSF) for security event transmission.
|
Example ssf demonstrates the implementation of an Authorization Server that supports Shared Signals Framework (SSF) for security event transmission. |
|
internal
|
|
|
authorize
Package authorize handles the implementation of endpoints for authorization requests and pushed authorization requests.
|
Package authorize handles the implementation of endpoints for authorization requests and pushed authorization requests. |
|
dcr
Package dcr implements the dynamic client registration and management endpoints.
|
Package dcr implements the dynamic client registration and management endpoints. |
|
discovery
Package discovery implements the endpoints where information about the Open ID Provider and its public JWKS is shared.
|
Package discovery implements the endpoints where information about the Open ID Provider and its public JWKS is shared. |
|
oidc
Package oidc is a complement of the package goidc containing private structs and functions that are not meant to be accessible for users of goidc.
|
Package oidc is a complement of the package goidc containing private structs and functions that are not meant to be accessible for users of goidc. |
|
storage
Package storage provides the default implementations of the storage interfaces goidc.ClientManager, goidc.AuthnSessionManager and goidc.GrantSessionManager.
|
Package storage provides the default implementations of the storage interfaces goidc.ClientManager, goidc.AuthnSessionManager and goidc.GrantSessionManager. |
|
strutil
Package strutil contains functions to help handling strings.
|
Package strutil contains functions to help handling strings. |
|
timeutil
Package timeutil provides utilities for working with time in a consistent manner.
|
Package timeutil provides utilities for working with time in a consistent manner. |
|
token
Package token implements all the logic to issue and validate rules related to access and ID tokens.
|
Package token implements all the logic to issue and validate rules related to access and ID tokens. |
|
userinfo
Package userinfo implements the user info endpoint.
|
Package userinfo implements the user info endpoint. |
|
pkg
|
|
|
goidc
Package goidc contains structs and functions which serve as the base to set up and interact with an OpenID Provider.
|
Package goidc contains structs and functions which serve as the base to set up and interact with an OpenID Provider. |
|
provider
Package provider implements a configurable Open ID provider.
|
Package provider implements a configurable Open ID provider. |
Click to show internal directories.
Click to hide internal directories.
