authelia/internal/authorization
James Elliott 65f69aeb4e
feat(oidc): jwk selection by id (#5464)
This adds support for JWK selection by ID on a per-client basis, and allows multiple JWK's for the same algorithm.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-05-22 21:14:32 +10:00
..
access_control_domain.go fix(authorization): subject wildcard domain rule not matching (#4187) 2022-10-18 19:14:34 +11:00
access_control_query.go feat(authorization): query parameter filtering (#3990) 2022-10-19 14:09:22 +11:00
access_control_resource.go fix(authorization): regex subj doesn't redirect anon user (#4037) 2022-09-26 14:33:08 +10:00
access_control_rule.go refactor: const int type stringers (#4588) 2022-12-17 23:39:24 +11:00
access_control_subjects.go refactor: clean up uri checking functions (#3943) 2022-09-03 11:51:02 +10:00
authorizer.go feat(server): customizable authz endpoints (#4296) 2023-01-25 20:36:40 +11:00
authorizer_test.go feat(oidc): jwk selection by id (#5464) 2023-05-22 21:14:32 +10:00
const.go feat(server): customizable authz endpoints (#4296) 2023-01-25 20:36:40 +11:00
regexp.go fix(authorization): regex subj doesn't redirect anon user (#4037) 2022-09-26 14:33:08 +10:00
types.go feat(authorization): query parameter filtering (#3990) 2022-10-19 14:09:22 +11:00
types_test.go refactor: http verbs etc (#5248) 2023-04-15 15:03:14 +10:00
util.go refactor: const int type stringers (#4588) 2022-12-17 23:39:24 +11:00
util_test.go refactor: const int type stringers (#4588) 2022-12-17 23:39:24 +11:00