Skip to content

Commit f0c4e9c

Browse files
authored
Update auth-upgrade-to-use-DPoP.md
1 parent 7d175e4 commit f0c4e9c

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

documentation/auth-upgrade-to-use-DPoP.md

+6-2
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ As of February 2022 this part of the code was further refactored and is now part
88

99
### Code review
1010

11-
For a detailed view of what changed, the team had a code review which was recorded and stored in the team videos, look for [auth-upgrade code review](https://solidos.solidcommunity.net/public/SolidOS%20team%20meetings/SolidOS_team_videos.html). At the same location find also videos about a knowledge transfer regarding the new authentication (look for 'solid OIDC').
11+
For a detailed view of what changed, the team had a code review which was recorded and stored in the team videos, look for [auth-upgrade code review](https://solidos.solidcommunity.net/public/SolidOS%20team%20meetings/SolidOS_team_videos.html). At the same location find also videos about a knowledge transfer regarding the new authentication (look for 'Solid-OIDC').
1212

1313
### UX upon login from NSS
1414

15-
There was also a diagram created before and after auth upgrade to record the UX upon login when one comes from the server. See diagrams [here](https://github.com/solidos/solidos/discussions/54).
15+
There was also a diagram created before and after auth upgrade to record the UX upon login when one comes from the server. See diagrams [here](https://github.com/solidos/solidos/discussions/54) (diagram is NSS dependent).
1616

1717
## How does this affect the SolidOS developer?
1818

@@ -65,3 +65,7 @@ All previous Solid Apps should be updated to be able to work with the current So
6565
### Login from an iFrame
6666

6767
One cannot login/logout from an iFrame anymore.
68+
69+
### Logout
70+
71+
The way logging out is experienced is different. In the decentralized ecosystem one does not simply log into an application but at the OpenID Provider endpoint (Identity Provider IdP). The IdP than consents access to the application to access the resource on the resource server (Pod). So LogOut is at least, in this use case, a double action - do not have access to the application frontend; - do not consent the application to access the resource server anymore. In both cases, these actions need to be coded in the application by invalidating cookies and session. The IdP can possibly expire the access/id token but that depends on the IdP provider configuration.

0 commit comments

Comments
 (0)