Skip to content

Commit

Permalink
change explanatory text to match code it explains
Browse files Browse the repository at this point in the history
as [previously flagged](solid#27 (comment))
  • Loading branch information
TallTed authored Aug 12, 2019
1 parent 0e6da67 commit 4150131
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions application-user-workflow.md
Original file line number Diff line number Diff line change
Expand Up @@ -331,7 +331,7 @@ GET https://secureauth.example/authorize?scope=openid&client_id=7243fd594bdcf9c7

That URL might look a little complex, but it's essentially a request to `https://secureauth.example/authorize` with the following URL parameters:

- `scope=openid`: a list of [OIDC scopes](https://auth0.com/docs/scopes/current/oidc-scopes) (attributes of the RS to which this token should have access). `open_id` is a scope that is needed to verify Alice's identity.
- `scope=openid`: a list of [OIDC scopes](https://auth0.com/docs/scopes/current/oidc-scopes) (attributes of the RS to which this token should have access). `openid` is a scope that is needed to verify Alice's identity.
- `client_id=7243fd594bdcf9c71a9b902274afaa30`: indicates the id of the client. The value for this field should be obtained in the registration phase.
- `response_type=id_token%20token` indicates the desired response data. Note that you cannot use response types that were not previously indicated during registration.
- `request=eyJhbGciOiJub25lIn0.eyJyZWRpc...`: A JWT containing the public key of the client and signed by the client using the private key. This is unique to WebID-OIDC. We will eventually use this to generate our pop-token.
Expand Down Expand Up @@ -491,4 +491,4 @@ With OP public keys obtained, the RS can confirm if the id_token was signed by t

#### 10. Returns Result

Given all went well, the RS should return the requested content.
Given all went well, the RS should return the requested content.

0 comments on commit 4150131

Please sign in to comment.