You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: en/identity-server/5.10.0/docs/learn/configuring-oauth2-openid-connect.md
+32-8Lines changed: 32 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,14 +124,38 @@ the users with an authorization server-based authentication.
124
124
<td>Additional Query Parameters</td>
125
125
<td>This is necessary if you are connecting to another Identity Server or application. Sometimes extra parameters are required by this IS or application so these can be specified here.
126
126
<div class="admonition note">
127
-
<p>If you wish to send query parameters that need to be updated dynamically with each OIDC request, the value needs to be defined within parenthesis.This value should be the key of the query parameter sent in the OIDC request URL. </br>
<p>WSO2 Identity Server supports sending additional information to your OIDC external IdP in the form of query parameters. You can configure three types of query parameters:</p>
129
+
<p><strong>1. Fixed query parameters</strong></p>
130
+
<p>Send a fixed value to the external identity provider.</p>
<p><strong>2. Dynamic query parameters from the initial request</strong></p>
133
+
<p>If you wish to send query parameters that need to be updated dynamically with each OIDC request, the value needs to be defined with the format <code>${paramName}</code>. This value should be the key of the query parameter sent in the OIDC request URL.</p>
134
+
<p><strong>Format:</strong> <code>login_hint=${paramName}</code> or <code>domain=${fidp}</code></p>
<p>If the application does not send the query parameter in the login request, the particular parameterized query parameter will not be sent to the external OIDC identity provider.</p>
138
+
<p><strong>3. Dynamic query parameters from adaptive authentication scripts</strong></p>
139
+
<p>Use the following format to send query parameters that are resolved using an adaptive authentication script: <code>$authparam{paramName}</code></p>
Copy file name to clipboardExpand all lines: en/identity-server/5.11.0/docs/learn/configuring-oauth2-openid-connect.md
+32-8Lines changed: 32 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,14 +119,38 @@ the users with an authorization server-based authentication.
119
119
<td>Additional Query Parameters</td>
120
120
<td>This is necessary if you are connecting to another Identity Server or application. Sometimes extra parameters are required by this IS or application so these can be specified here.
121
121
<div class="admonition note">
122
-
<p>If you wish to send query parameters that need to be updated dynamically with each OIDC request, the value needs to be defined within parenthesis.This value should be the key of the query parameter sent in the OIDC request URL. </br>
<p>WSO2 Identity Server supports sending additional information to your OIDC external IdP in the form of query parameters. You can configure three types of query parameters:</p>
124
+
<p><strong>1. Fixed query parameters</strong></p>
125
+
<p>Send a fixed value to the external identity provider.</p>
<p><strong>2. Dynamic query parameters from the initial request</strong></p>
128
+
<p>If you wish to send query parameters that need to be updated dynamically with each OIDC request, the value needs to be defined with the format <code>${paramName}</code>. This value should be the key of the query parameter sent in the OIDC request URL.</p>
129
+
<p><strong>Format:</strong> <code>login_hint=${paramName}</code> or <code>domain=${fidp}</code></p>
<p>If the application does not send the query parameter in the login request, the particular parameterized query parameter will not be sent to the external OIDC identity provider.</p>
133
+
<p><strong>3. Dynamic query parameters from adaptive authentication scripts</strong></p>
134
+
<p>Use the following format to send query parameters that are resolved using an adaptive authentication script: <code>$authparam{paramName}</code></p>
0 commit comments