Skip to content

Commit 58b65bf

Browse files
jesseyayn2ygk
authored andcommitted
docs
1 parent d828d75 commit 58b65bf

File tree

3 files changed

+13
-0
lines changed

3 files changed

+13
-0
lines changed

AUTHORS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ Hossein Shakiba
4141
Hiroki Kiyohara
4242
Jens Timmerman
4343
Jerome Leclanche
44+
Jesse Gibbs
4445
Jim Graham
4546
Jonas Nygaard Pedersen
4647
Jonathan Steffan

CHANGELOG.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,9 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
1616

1717
## [unreleased]
1818

19+
### Added
20+
* Support `prompt=login` for the OIDC Authorization Code Flow
21+
1922
### Changed
2023
* #1152 `createapplication` management command enhanced to display an auto-generated secret before it gets hashed.
2124

docs/oidc.rst

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -359,6 +359,15 @@ token, so you will probably want to re-use that::
359359
claims["color_scheme"] = get_color_scheme(request.user)
360360
return claims
361361

362+
Customizing the login flow
363+
==========================
364+
365+
Clients can request that the user logs in each time a request to the
366+
``/authorize`` endpoint is made during the OIDC Authorization Code Flow by
367+
adding the ``prompt=login`` query parameter and value. Only ``login`` is
368+
currently supported. See
369+
`OIDC Docs <https://openid.net/specs/openid-connect-core-1_0.html#AuthRequest>`_
370+
for details.
362371

363372
OIDC Views
364373
==========

0 commit comments

Comments
 (0)