Documentation ¶
Index ¶
Constants ¶
View Source
const ( // GrantTypeAuthorizationCode represents AuthorizationCode grant type name. GrantTypeAuthorizationCode = "authorization_code" // GrantTypeClientCredentials represents ClientCredentials grant type name. GrantTypeClientCredentials = "client_credentials" // GrantTypeDeviceCode represents DeviceCode grant type name. GrantTypeDeviceCode = "urn:ietf:params:oauth:grant-type:device_code" // GrantTypeRefreshToken represents RefreshToken grant type name. GrantTypeRefreshToken = "refresh_token" // GrantTypeJWTBearer represents JWT Bearer Token grant type name. GrantTypeJWTBearer = "urn:ietf:params:oauth:grant-type:jwt-bearer" // GrantTypeSAML2Bearer represents SAML 2 Bearer token grant type. GrantTypeSAML2Bearer = "urn:ietf:params:oauth:grant-type:saml2-bearer" // GrantTypeTokenExchange represent token exchange flow (RFC8693) GrantTypeTokenExchange = "urn:ietf:params:oauth:grant-type:token-exchange" )
View Source
const ( // ScopeOpenID represents OpenID scope name. ScopeOpenID = "openid" // ScopeOfflineAccess represents offline access scope name. ScopeOfflineAccess = "offline_access" )
View Source
const ( // AssertionTypeJWTBearer repesents JWT Bearer assertion name. AssertionTypeJWTBearer = "urn:ietf:params:oauth:client-assertion-type:jwt-bearer" // AssertionTypePasetoBearer represents PASETO Bearer assertion name. AssertionTypePasetoBearer = "urn:solid:params:oauth:client-assertion-type:paseto-bearer" // AssertionTypeJWTClientAttestation represents JWT Client Attestation name. AssertionTypeJWTClientAttestation = "urn:ietf:params:oauth:client-assertion-type:jwt-client-attestation" )
View Source
const ( // ResponseTypeCode represents the authorization code response type defined // in OAuth 2.0 ResponseTypeCode = "code" // ResponseTypeToken represents the implicit response type defined in OAuth 2.0 ResponseTypeToken = "token" )
View Source
const ( // ResponseModeQuery - Authorization Response parameters are encoded in the // query string added to the redirect_uri when redirecting back to the OAuth // Client. ResponseModeQuery = "query" // ResponseModeFragment - Authorization Response parameters are encoded in // the fragment added to the redirect_uri when redirecting back to the OAuth // Client. ResponseModeFragment = "fragment" // ResponseModeFormPost - Authorization Response parameters are encoded as // HTML form values that are auto-submitted in the User Agent, and thus are // transmitted via the HTTP POST method to the Client, with the result // parameters being encoded in the body using the // application/x-www-form-urlencoded format. ResponseModeFormPost = "form_post" // ResponseModeJWT represents JARM encoded response. ResponseModeJWT = "jwt" // ResponseModeQueryJWT represents JARM encoded response as query parameter. ResponseModeQueryJWT = "query.jwt" // ResponseModeFragmentJWT represents JARM encoded response as fragment. ResponseModeFragmentJWT = "fragment.jwt" // ResponseModeFormPOSTJWT represents JARM encoded response as form post. ResponseModeFormPOSTJWT = "form_post.jwt" )
View Source
const ( // AuthMethodNone : The client is a public client as defined in OAuth 2.0 AuthMethodNone = "none" // AuthMethodClientSecretPost : The client uses the HTTP POST parameters as // defined in OAuth 2.0 AuthMethodClientSecretPost = "client_secret_post" // AuthMethodClientSecretBasic : The client uses HTTP Basic as defined in // OAuth 2.0 AuthMethodClientSecretBasic = "client_secret_basic" // AuthMethodPrivateKeyJWT : The client uses JWT assertion. AuthMethodPrivateKeyJWT = "private_key_jwt" // AuthMethodClientAttestationJWT represents the client attestation // authentication mechanism. AuthMethodClientAttestationJWT = "attest_jwt_client_auth" )
View Source
const ( // ApplicationTypeServerSideWeb is a web application with authorization logic on the server side. ApplicationTypeServerSideWeb = "web" // ApplicationTypeClientSideWeb is a rich client web application with all authorization logic in browser. ApplicationTypeClientSideWeb = "browser" // ApplicationTypeNative is a desktop or a mobile application able to request authorization token non-interactively. ApplicationTypeNative = "native" // ApplicationTypeService is a script that needs to access resources on behalf of itself. ApplicationTypeService = "service" // ApplicationTypeDevice is is designed for devices that either do not have access to a browser or have limited input capabilities. ApplicationTypeDevice = "device" )
View Source
const ( // SubjectTypePublic defines subject as public data. This provides the same sub (subject) value to all Clients. // It is the default if the provider has no subject_types_supported element in its discovery document. SubjectTypePublic = "public" // SubjectTypePairwise defines subject masquerade strategy. This provides a different sub value to each Client, // so as not to enable Clients to correlate the End-User's activities without permission. SubjectTypePairwise = "pairwise" )
View Source
const ( // TokenExchangeAccessTokenType indicates that the token is an OAuth 2.0 access token issued by // the given authorization server. TokenExchangeAccessTokenType = "urn:ietf:params:oauth:token-type:access_token" // TokenExchangeRefreshTokenType indicates that the token is an OAuth 2.0 refresh token issued by // the given authorization server. TokenExchangeRefreshTokenType = "urn:ietf:params:oauth:token-type:refresh_token" // TokenExchangeIDTokenType indicates that the token is an ID Token as defined in Section 2 of // [OpenID.Core]. TokenExchangeIDTokenType = "urn:ietf:params:oauth:token-type:id_token" // TokenExchangeSAML1Type indicates that the token is a base64url-encoded SAML 1.1 // [OASIS.saml-core-1.1] assertion. TokenExchangeSAML1Type = "urn:ietf:params:oauth:token-type:saml1" // TokenExchangeSAML2Type indicates that the token is a base64url-encoded SAML 2.0 // [OASIS.saml-core-2.0-os] assertion. TokenExchangeSAML2Type = "urn:ietf:params:oauth:token-type:saml2" // TokenExchangeJWTType indicates that the token is a JWT. TokenExchangeJWTType = "urn:ietf:params:oauth:token-type:jwt" )
View Source
const ( // PromptNone - The Authorization Server MUST NOT display any authentication or consent user interface pages. // An error is returned if an End-User is not already authenticated or the Client does not have pre-configured // consent for the requested Claims or does not fulfill other conditions for processing the request. The error // code will typically be login_required, interaction_required, or another code defined in Section 3.1.2.6. This // can be used as a method to check for existing authentication and/or consent. PromptNone = "none" // PromptLogin - The Authorization Server SHOULD prompt the End-User for reauthentication. If it cannot // reauthenticate the End-User, it MUST return an error, typically login_required. PromptLogin = "login" // PromptConsent - The Authorization Server SHOULD prompt the End-User for consent before returning information to // the Client. If it cannot obtain consent, it MUST return an error, typically consent_required. PromptConsent = "consent" // The Authorization Server SHOULD prompt the End-User to select a user account. This enables an End-User who has // multiple accounts at the Authorization Server to select amongst the multiple accounts that they might have // current sessions for. If it cannot obtain an account selection choice made by the End-User, it MUST return an // error, typically account_selection_required. PromptSelectAccount = "select_account" )
View Source
const (
// CodeChallengeMethodSha256 represents sha256 code challenge method name.
CodeChallengeMethodSha256 = "S256"
)
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.