From 97d932d832c50199d55e84be8153995c7af4ff72 Mon Sep 17 00:00:00 2001 From: Erik Jan de Wit Date: Fri, 27 May 2022 11:26:23 +0200 Subject: [PATCH] Added missing field (#2691) --- public/resources/en/clients-help.json | 1 + public/resources/en/clients.json | 1 + .../OpenIdConnectCompatibilityModes.tsx | 27 ++++++++++++++++++- 3 files changed, 28 insertions(+), 1 deletion(-) diff --git a/public/resources/en/clients-help.json b/public/resources/en/clients-help.json index 578bf128bd..7f13247eb9 100644 --- a/public/resources/en/clients-help.json +++ b/public/resources/en/clients-help.json @@ -90,6 +90,7 @@ "excludeSessionStateFromAuthenticationResponse": "If this is on, the parameter 'session_state' will not be included in OpenID Connect Authentication Response. It is useful if your client uses older OIDC / OAuth2 adapter, which does not support 'session_state' parameter.", "useRefreshTokens": "If this is on, a refresh_token will be created and added to the token response. If this is off then no refresh_token will be generated.", "useRefreshTokenForClientCredentialsGrant": "If this is on, a refresh_token will be created and added to the token response if the client_credentials grant is used. The OAuth 2.0 RFC6749 Section 4.4.3 states that a refresh_token should not be generated when client_credentials grant is used. If this is off then no refresh_token will be generated and the associated user session will be removed.", + "useLowerCaseBearerType": "If this is on, token responses will be set the with the type \"bearer\" in lower-case. By default, the server sets the type as \"Bearer\" as defined by RFC6750.", "advancedSettingsOpenid-connect": "This section is used to configure advanced settings of this client related to OpenID Connect protocol", "advancedSettingsSaml": "This section is used to configure advanced settings of this client", "assertionLifespan": "Lifespan set in the SAML assertion conditions. After that time the assertion will be invalid. The \"SessionNotOnOrAfter\" attribute is not modified and continue using the \"SSO Session Max\" time defined at realm level.", diff --git a/public/resources/en/clients.json b/public/resources/en/clients.json index 06d20df236..2e45f8d451 100644 --- a/public/resources/en/clients.json +++ b/public/resources/en/clients.json @@ -462,6 +462,7 @@ "excludeSessionStateFromAuthenticationResponse": "Exclude Session State From Authentication Response", "useRefreshTokens": "Use refresh tokens", "useRefreshTokenForClientCredentialsGrant": "Use refresh tokens for client credentials grant", + "useLowerCaseBearerType": "Use lower-case bearer type in token responses", "assertionConsumerServicePostBindingURL": "Assertion Consumer Service POST Binding URL", "assertionConsumerServiceRedirectBindingURL": "Assertion Consumer Service Redirect Binding URL", "logoutServicePostBindingURL": "Logout Service POST Binding URL", diff --git a/src/clients/advanced/OpenIdConnectCompatibilityModes.tsx b/src/clients/advanced/OpenIdConnectCompatibilityModes.tsx index 7ed9ef0a8b..89452b1247 100644 --- a/src/clients/advanced/OpenIdConnectCompatibilityModes.tsx +++ b/src/clients/advanced/OpenIdConnectCompatibilityModes.tsx @@ -98,7 +98,32 @@ export const OpenIdConnectCompatibilityModes = ({ )} /> - + + } + > + ( + onChange(value.toString())} + /> + )} + /> +