Skip to content
This repository was archived by the owner on Apr 19, 2023. It is now read-only.

Commit 82099ce

Browse files
cgeorgilakismposolda
authored andcommitted
Short verification_uri for Device Authorization Request
1 parent 4e2ed62 commit 82099ce

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

server_admin/topics/sso-protocols/con-oidc-auth-flows.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ See the <<_service_accounts,Service Accounts>> chapter for more information.
7777
This is used by clients running on internet-connected devices that have limited input capabilities or lack a suitable browser. Here's a brief summary of the protocol:
7878

7979
. The application requests {project_name} a device code and a user code. {project_name} creates a device code and a user code. {project_name} returns a response including the device code and the user code to the application.
80-
. The application provides the user with the user code and the verification URI. The user accesses a verification URI to be authenticated by using another browser.
80+
. The application provides the user with the user code and the verification URI. The user accesses a verification URI to be authenticated by using another browser. You could define a short verification_uri that will be redirected to Keycloak verification URI (/realms/realm_name/device)outside Keycloak - fe in a proxy.
8181
. The application repeatedly polls {project_name} to find out if the user completed the user authorization. If user authentication is complete, the application exchanges the device code for an _identity_, _access_ and _refresh_ token.
8282

8383
[[_client_initiated_backchannel_authentication_grant]]

0 commit comments

Comments
 (0)