You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Successfully tested with Angular 4.3+, Angular 5 and its Router,PathLocationStrategy as well as HashLocationStrategy and CommonJS-Bundling via webpack. At server side we've used IdentityServer (.NET/ .NET Core) and Redhat's Keycloak (Java).
30
+
Successfully tested with Angular 4.3+, Angular 5 and its Router,PathLocationStrategy as well as HashLocationStrategy and CommonJS-Bundling via webpack. At server side we've used IdentityServer (.NET/ .NET Core) and Redhat's Keycloak (Java).
31
31
32
32
## Release Cycle
33
33
@@ -272,8 +272,7 @@ OAuthModule.forRoot({
272
272
273
273
## Routing
274
274
275
-
If you use the ``PathLocationStragegy`` (which is on by default) and have a general catch-all-route (``path: '**'``) you should be fine. Otherwise look up the section ``Routing with the HashStrategy`` in the [documation](https://manfredsteyer.github.io/angular-oauth2-oidc/angular-oauth2-oidc/docs/).
276
-
275
+
If you use the ``PathLocationStrategy`` (which is on by default) and have a general catch-all-route (``path: '**'``) you should be fine. Otherwise look up the section ``Routing with the HashStrategy`` in the [documentation](https://manfredsteyer.github.io/angular-oauth2-oidc/angular-oauth2-oidc/docs/).
Copy file name to clipboardExpand all lines: angular-oauth2-oidc/README.MD
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ See [Release Notes](https://github.com/manfredsteyer/angular-oauth2-oidc/release
59
59
- Providing Events via the observable ``events``.
60
60
- The event ``token_expires`` can be used together with a silent refresh to automatically refresh a token when/ before it expires (see also property ``timeoutFactor``).
61
61
62
-
## Additional Features
62
+
## Additional Features
63
63
- Logging in via OAuth2 and OpenId Connect (OIDC) Implicit Flow (where user is redirected to Identity Provider)
64
64
- "Logging in" via Password Flow (where user enters his/her password into the client)
65
65
- Token Refresh for Password Flow by using a Refresh Token
@@ -83,7 +83,7 @@ You can use the OIDC-Sample-Server mentioned in the samples for Testing. It assu
@@ -105,7 +105,7 @@ import { OAuthModule } from 'angular-oauth2-oidc';
105
105
[...]
106
106
107
107
@NgModule({
108
-
imports: [
108
+
imports: [
109
109
[...]
110
110
HttpModule,
111
111
OAuthModule.forRoot()
@@ -116,13 +116,13 @@ import { OAuthModule } from 'angular-oauth2-oidc';
116
116
[...]
117
117
],
118
118
bootstrap: [
119
-
AppComponent
119
+
AppComponent
120
120
]
121
121
})
122
122
exportclassAppModule {
123
123
}
124
124
125
-
```
125
+
```
126
126
127
127
## Configuring for Implicit Flow
128
128
@@ -236,9 +236,9 @@ The following snippet contains the template for the login page:
236
236
237
237
### Skipping the Login Form
238
238
239
-
If you don't want to display a login form that tells the user that they are redirected to the identity server, you can use the convenince function ``this.oauthService.loadDiscoveryDocumentAndLogin();`` instead of ``this.oauthService.loadDiscoveryDocumentAndTryLogin();`` when setting up the library.
239
+
If you don't want to display a login form that tells the user that they are redirected to the identity server, you can use the convenince function ``this.oauthService.loadDiscoveryDocumentAndLogin();`` instead of ``this.oauthService.loadDiscoveryDocumentAndTryLogin();`` when setting up the library.
240
240
241
-
This directly redirects the user to the identity server if there are no valid tokens.
241
+
This directly redirects the user to the identity server if there are no valid tokens.
Copy file name to clipboardExpand all lines: angular-oauth2-oidc/docs/additional-documentation/working-with-httpinterceptors.html
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -593,7 +593,7 @@
593
593
594
594
595
595
<h1id="interceptors">Interceptors</h1>
596
-
<p>Since 3.1 the library uses a default HttpInterceptor that takes care about transmitting the access_token to the resource server and about error handling for security related errors (HTTP status codes 401 and 403) received from the resource server. To put in on, just set <code>sendAccessToken</code> to <code>true</code> and set <code>allowedUrls</code> to an array with prefixes for the respective urls. Use lower case for the prefixes:</p>
596
+
<p>Since 3.1 the library uses a default HttpInterceptor that takes care about transmitting the access_token to the resource server and about error handling for security related errors (HTTP status codes 401 and 403) received from the resource server. To enable it, just set <code>sendAccessToken</code> to <code>true</code> and set <code>allowedUrls</code> to an array with prefixes for the respective urls. Use lower case for the prefixes:</p>
0 commit comments