Skip to content

Commit

Permalink
image size fixes
Browse files Browse the repository at this point in the history
  • Loading branch information
divyaamunugama committed May 8, 2024
1 parent 9918f79 commit 37be931
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,8 @@ You can get the endpoints from the console as follows:
2. Select an OIDC application from the list.

3. Go to the **Info** tab of the application and find the server endpoints to your organization.
![app-help-panel-for-endpoints]({{base_path}}/assets/img/guides/applications/app-endpoint-help.png)

![app-help-panel-for-endpoints]({{base_path}}/assets/img/guides/applications/app-endpoint-help.png){: width="700" style="border: 0.3px solid lightgrey;"}

## What's next?

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,6 @@ You will receive a response with the request_uri and the time of expiry.
```

!!! note

- {{product_name}} uses the prefix, `urn:ietf:params:oauth:par:request_uri:` for the request_uri. The `/authorize` endpoint processes the request as initiated with PAR, only if the request_uri is of this format.
- By default, the request_uri expires after 60 seconds. You can change the time of expiry (e.g. 90 seconds), by adding the following configuration to the `deployment.toml` file found in the `<IS_HOME>/repository/conf` directory.
```json
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ Register the client application in {{ product_name }} as follows:

2. Go to the **Protocol** tab of the new application and configure the required grant type.

![oidc protocols]({{base_path}}/assets/img/guides/applications/oidc/oidc_protocols.png)
![oidc protocols]({{base_path}}/assets/img/guides/applications/oidc/oidc_protocols.png){: width="700" style="border: 0.3px solid lightgrey;"}

## Prepare the private key and public key

Expand Down Expand Up @@ -223,4 +223,4 @@ To enable token reuse in {{ product_name }}.
2. Under **Login Security**, click **Private Key JWT Client Authentication (OIDC)**.
3. Switch on the toggle to enable token reuse.

![configure JWT reuse]({{base_path}}/assets/img/guides/applications/oidc/private-key-jwt-config.png)
![configure JWT reuse]({{base_path}}/assets/img/guides/applications/oidc/private-key-jwt-config.png){: width="700" style="border: 0.3px solid lightgrey;"}

0 comments on commit 37be931

Please sign in to comment.