This repository has been archived by the owner on Dec 24, 2020. It is now read-only.
Releases: aspnet-contrib/AspNet.Security.OpenIdConnect.Server
Releases · aspnet-contrib/AspNet.Security.OpenIdConnect.Server
2.0.0
1.1.0
Update version.props to build 1.1.0 packages
2.0.0-rc3
Update version.props to build 2.0.0-rc3-final packages
1.1.0-preview
Update version.props to build 1.1.0-preview-final packages
2.0.0-rc2
Update version.props to build 2.0.0-rc2-final packages
2.0.0-rc1
Incorporate the changes committed in the rel/1.0.2 branch
1.0.2
Most important changes:
- Calling
context.HandleResponse()
from theSerializeAuthorizationCode
,SerializeAccessToken
,SerializeIdentityToken
andSerializeRefreshToken
events no longer throws an exception if the authentication ticket is not explicitly set (c734c6f). - An invalid exception message mentioning OpenIddict was reworded (cd83912).
- The authorization code/access token/identity token/refresh token deserialization methods are no longer called twice
for introspection and revocation requests that specify atoken_type_hint
that doesn't match the actual token type (c561a34). - A standard-compliant
Expires
HTTP header is now returned by the non-interactive ASOS endpoints (5af1d44). - New constants have been added to
OpenIdConnectConstants
(0980fb8)
(461ecd4). - New events allowing to control the sign-in, sign-out and challenge operations have been introduced (d95810b)
(3801427).
1.0.1
Most important changes:
- The
MatchEndpointContext.Options
property that had been accidentally removed in 1.0.0 has been reintroduced in 1.0.1
(f17d9a4). - An exception is now automatically thrown at startup when registering a signing certificate that is no longer or not yet valid
(583be00). - Internal code relying on
JwtSecurityTokenHandler.CreateToken()
/WriteToken()
has been updated to use
JwtSecurityTokenHandler.CreateEncodedJwt()
to ensure JWT tokens are not signed twice
(a499f11).
1.0.0
Update version.props to build 1.0.0 packages
1.0.0-rc1
Update project.json to build 1.0.0-rc1-final packages