diff --git a/en/includes/guides/authentication/oidc/discover-oidc-configs.md b/en/includes/guides/authentication/oidc/discover-oidc-configs.md index 7fb523d48f..eac856939a 100644 --- a/en/includes/guides/authentication/oidc/discover-oidc-configs.md +++ b/en/includes/guides/authentication/oidc/discover-oidc-configs.md @@ -94,7 +94,8 @@ You can get the endpoints from the console as follows: 2. Select an OIDC application from the list. 3. Go to the **Info** tab of the application and find the server endpoints to your organization. - ![app-help-panel-for-endpoints]({{base_path}}/assets/img/guides/applications/app-endpoint-help.png) + + ![app-help-panel-for-endpoints]({{base_path}}/assets/img/guides/applications/app-endpoint-help.png){: width="700" style="border: 0.3px solid lightgrey;"} ## What's next? diff --git a/en/includes/guides/authentication/oidc/implement-login-with-par.md b/en/includes/guides/authentication/oidc/implement-login-with-par.md index ae5279082f..2e203bf96b 100644 --- a/en/includes/guides/authentication/oidc/implement-login-with-par.md +++ b/en/includes/guides/authentication/oidc/implement-login-with-par.md @@ -59,7 +59,6 @@ You will receive a response with the request_uri and the time of expiry. ``` !!! note - - {{product_name}} uses the prefix, `urn:ietf:params:oauth:par:request_uri:` for the request_uri. The `/authorize` endpoint processes the request as initiated with PAR, only if the request_uri is of this format. - By default, the request_uri expires after 60 seconds. You can change the time of expiry (e.g. 90 seconds), by adding the following configuration to the `deployment.toml` file found in the `/repository/conf` directory. ```json diff --git a/en/includes/guides/authentication/oidc/private-key-jwt-client-auth.md b/en/includes/guides/authentication/oidc/private-key-jwt-client-auth.md index 6d717a6104..2751a4634a 100644 --- a/en/includes/guides/authentication/oidc/private-key-jwt-client-auth.md +++ b/en/includes/guides/authentication/oidc/private-key-jwt-client-auth.md @@ -31,7 +31,7 @@ Register the client application in {{ product_name }} as follows: 2. Go to the **Protocol** tab of the new application and configure the required grant type. - ![oidc protocols]({{base_path}}/assets/img/guides/applications/oidc/oidc_protocols.png) + ![oidc protocols]({{base_path}}/assets/img/guides/applications/oidc/oidc_protocols.png){: width="700" style="border: 0.3px solid lightgrey;"} ## Prepare the private key and public key @@ -223,4 +223,4 @@ To enable token reuse in {{ product_name }}. 2. Under **Login Security**, click **Private Key JWT Client Authentication (OIDC)**. 3. Switch on the toggle to enable token reuse. - ![configure JWT reuse]({{base_path}}/assets/img/guides/applications/oidc/private-key-jwt-config.png) + ![configure JWT reuse]({{base_path}}/assets/img/guides/applications/oidc/private-key-jwt-config.png){: width="700" style="border: 0.3px solid lightgrey;"}