Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for application passwords #188

Closed
clems4ever opened this issue Nov 1, 2017 · 0 comments · Fixed by #6774
Closed

Support for application passwords #188

clems4ever opened this issue Nov 1, 2017 · 0 comments · Fixed by #6774
Labels
area/openid-connect OpenID Connect 1.0 / OAuth 2.0 related features/bugs priority/3/medium Medium priority items type/enhancement Similar to a feature but less impactful

Comments

@clems4ever
Copy link
Member

No description provided.

@clems4ever clems4ever added type/enhancement Similar to a feature but less impactful priority/2/high High priority items labels Nov 1, 2017
@clems4ever clems4ever added priority/3/medium Medium priority items and removed priority/2/high High priority items labels Nov 28, 2017
@james-d-elliott james-d-elliott added this to To do in Management Interface via automation May 2, 2020
@james-d-elliott james-d-elliott added the area/openid-connect OpenID Connect 1.0 / OAuth 2.0 related features/bugs label Dec 6, 2022
james-d-elliott added a commit that referenced this issue Mar 4, 2024
This implements user authorization utilizing the OAuth 2.0 bearer scheme (i.e. RFC6750) for both the authorize code grant and client credentials grant.

Closes #2023, Closes #188.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
Management Interface automation moved this from To do to Done Mar 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/openid-connect OpenID Connect 1.0 / OAuth 2.0 related features/bugs priority/3/medium Medium priority items type/enhancement Similar to a feature but less impactful
Projects
Development

Successfully merging a pull request may close this issue.

2 participants