@@ -185,8 +185,6 @@ def __init__(
185185 storage: TokenStorage,
186186 idp_token_endpoint: str,
187187 token_exchange_params: TokenExchangeParameters,
188- redirect_handler: Callable[[str], Awaitable[None]] | None = None,
189- callback_handler: Callable[[], Awaitable[tuple[str, str | None]]] | None = None,
190188 timeout: float = 300.0,
191189 ) -> None:
192190 """Initialize Enterprise Auth OAuth Client.
@@ -197,16 +195,12 @@ def __init__(
197195 storage: Token storage implementation
198196 idp_token_endpoint: Enterprise IdP token endpoint URL
199197 token_exchange_params: Token exchange parameters
200- redirect_handler: Optional redirect handler
201- callback_handler: Optional callback handler
202198 timeout: Request timeout in seconds
203199 """
204200 super().__init__(
205201 server_url=server_url,
206202 client_metadata=client_metadata,
207203 storage=storage,
208- redirect_handler=redirect_handler,
209- callback_handler=callback_handler,
210204 timeout=timeout,
211205 )
212206 self.idp_token_endpoint = idp_token_endpoint
@@ -384,7 +378,7 @@ def decode_id_jag(id_jag: str) -> IDJAGClaims:
384378 Decoded ID-JAG claims
385379
386380 Note:
387- For verification, use server-side validation instead .
381+ This function does not verify the JWT, instead relying on the receiving server to validate it .
388382 """
389383 # Decode without verification for inspection
390384 claims = jwt.decode(id_jag, options={"verify_signature": False})
0 commit comments