• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    公众号

TypeScript angular-auth-oidc-client.OidcSecurityService类代码示例

原作者: [db:作者] 来自: [db:来源] 收藏 邀请

本文整理汇总了TypeScript中angular-auth-oidc-client.OidcSecurityService的典型用法代码示例。如果您正苦于以下问题:TypeScript OidcSecurityService类的具体用法?TypeScript OidcSecurityService怎么用?TypeScript OidcSecurityService使用的例子?那么恭喜您, 这里精选的类代码示例或许可以为您提供帮助。



在下文中一共展示了OidcSecurityService类的13个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于我们的系统推荐出更棒的TypeScript代码示例。

示例1: constructor

  constructor(public oidcSecurityService: OidcSecurityService) {

      const openIDImplicitFlowConfiguration = new OpenIDImplicitFlowConfiguration();
      openIDImplicitFlowConfiguration.stsServer = 'https://daue2sungtwb01.azurewebsites.net/core';
      openIDImplicitFlowConfiguration.redirect_url = environment.redirectUrl;
      openIDImplicitFlowConfiguration.client_id = 'lex.test.client';
      openIDImplicitFlowConfiguration.response_type = 'id_token token';
      openIDImplicitFlowConfiguration.scope = 'openid profile roles all_claims lexapi';
      openIDImplicitFlowConfiguration.post_logout_redirect_uri = environment.postLogoutRedirectUri;
      openIDImplicitFlowConfiguration.post_login_route = '/home';
      openIDImplicitFlowConfiguration.forbidden_route = '/Forbidden';
      openIDImplicitFlowConfiguration.unauthorized_route = '/Unauthorized';
      openIDImplicitFlowConfiguration.trigger_authorization_result_event = true;
      openIDImplicitFlowConfiguration.log_console_warning_active = true;
      openIDImplicitFlowConfiguration.log_console_debug_active = true;
      openIDImplicitFlowConfiguration.max_id_token_iat_offset_allowed_in_seconds = 20;
      openIDImplicitFlowConfiguration.override_well_known_configuration = false;

      this.oidcSecurityService.setupModule(openIDImplicitFlowConfiguration);
  }
开发者ID:level2000,项目名称:Main,代码行数:20,代码来源:app.module.ts


示例2: intercept

  intercept(
    req: HttpRequest<any>,
    next: HttpHandler
  ): Observable<HttpEvent<any>> {
    let requestToForward = req;

    if (this.oidcSecurityService === undefined) {
      this.oidcSecurityService = this.injector.get(OidcSecurityService);
    }
    if (this.oidcSecurityService !== undefined) {
      const token = this.oidcSecurityService.getToken();
      if (token !== '') {
        const tokenValue = 'Bearer ' + token;
        requestToForward = req.clone({
          setHeaders: { 'Authorization': tokenValue }
        });
      }
    } else {
      console.log('OidcSecurityService undefined: NO auth header!');
    }
    return next.handle(requestToForward);
  }
开发者ID:ArmyMusicOnline,项目名称:ami,代码行数:22,代码来源:auth.interceptor.ts


示例3: onOidcModuleSetup

 private onOidcModuleSetup() {
   if (window.location.hash) {
     this.oidcSecurityService.authorizedCallback();
   } else {
     if ('/autologin' !== window.location.pathname) {
       this.write('redirect', window.location.pathname);
     }
     this.oidcSecurityService
       .getIsAuthorized()
       .subscribe((authorized: boolean) => {
         if (!authorized) {
           this.router.navigate(['/autologin']);
         } else {
         }
       });
   }
 }
开发者ID:ArmyMusicOnline,项目名称:ami,代码行数:17,代码来源:app.component.ts


示例4: onOidcModuleSetup

 private onOidcModuleSetup() {
   if (window.location.hash) {
     this.oidcSecurityService.authorizedCallback();
   } else {
     if ('/autologin' !== window.location.pathname) {
       this.write('redirect', window.location.pathname);
     }
     this.oidcSecurityService
       .getIsAuthorized()
       .subscribe((authorized: boolean) => {
         if (!authorized) {
           this.router.navigate(['/autologin']);
         } else {
           if (!this.read('from_silent_renew')) {
             this.store.dispatch(new fromStore.LoadPanels());
           }
         }
       });
   }
 }
开发者ID:ArmyMusicOnline,项目名称:ami,代码行数:20,代码来源:app.component.ts


示例5: OpenIDImplicitFlowConfiguration

    this.oidcConfigService.onConfigurationLoaded.subscribe(() => {
      const openIDImplicitFlowConfiguration = new OpenIDImplicitFlowConfiguration();

      openIDImplicitFlowConfiguration.stsServer = environment.stsServer;
      // openIDImplicitFlowConfiguration.redirect_url = document.baseURI;
      openIDImplicitFlowConfiguration.redirect_url = document.baseURI;
      // openIDImplicitFlowConfiguration.redirect_url = document.baseURI + 'assets/silent_login.html';
      // The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer
      // identified by the iss (issuer) Claim as an audience.
      // The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience,
      // or if it contains additional audiences not trusted by the Client.
      openIDImplicitFlowConfiguration.client_id = environment.clientId;
      openIDImplicitFlowConfiguration.response_type = 'id_token token';
      openIDImplicitFlowConfiguration.scope = 'openid profile email offline_access ala roles';
      openIDImplicitFlowConfiguration.post_logout_redirect_uri = document.baseURI;
      openIDImplicitFlowConfiguration.start_checksession = false; // CAS doesn't support this
      openIDImplicitFlowConfiguration.silent_renew = true;
      openIDImplicitFlowConfiguration.silent_renew_offset_in_seconds = 3600;
      openIDImplicitFlowConfiguration.silent_renew_url = document.baseURI + 'assets/silent_renew.html';
      openIDImplicitFlowConfiguration.silent_redirect_url = document.baseURI + 'assets/silent_renew.html';
      // openIDImplicitFlowConfiguration.storage = window.localStorage;
      // openIDImplicitFlowConfiguration.post_login_route = '/';
      // HTTP 403
      openIDImplicitFlowConfiguration.forbidden_route = '/403';
      // HTTP 401
      openIDImplicitFlowConfiguration.unauthorized_route = '/401';
      openIDImplicitFlowConfiguration.log_console_warning_active = true; // false
      openIDImplicitFlowConfiguration.log_console_debug_active = true; // false
      // id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,
      // limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.
      openIDImplicitFlowConfiguration.max_id_token_iat_offset_allowed_in_seconds = 3600; // 3
      openIDImplicitFlowConfiguration.auto_userinfo = true;
      openIDImplicitFlowConfiguration.auto_clean_state_after_authentication = true;
      // openIDImplicitFlowConfiguration.trigger_authorization_result_event = true;
      openIDImplicitFlowConfiguration.post_login_route = '/';
      // openIDImplicitFlowConfiguration.resource = '';
      // openIDImplicitFlowConfiguration.silent_renew = true;
      // openIDImplicitFlowConfiguration.trigger_authorization_result_event = false;

      const authWellKnownEndpoints = new AuthWellKnownEndpoints();
      authWellKnownEndpoints.setWellKnownEndpoints(this.oidcConfigService.wellKnownEndpoints);

      window.addEventListener("sc-login-message", (evt: CustomEvent) => {
        console.log("sc-login-message", evt.detail);
        this.oidcSecurityService.authorizedCallback(evt.detail)
      });
      this.oidcSecurityService.setupModule(
        openIDImplicitFlowConfiguration,
        authWellKnownEndpoints
      );

    });
开发者ID:AtlasOfLivingAustralia,项目名称:seasonal-calendar,代码行数:52,代码来源:app.module.ts


示例6: intercept

  intercept(req: HttpRequest<any>, next: HttpHandler): Observable<HttpEvent<any>> {
    if (req.url.startsWith(environment.api)) {

      const token = this.oidcSecurityService.getToken();
      if (token !== '') {
        const tokenValue = 'Bearer ' + token;
        return next.handle(req.clone({
          setHeaders: {
            'Authorization': tokenValue
          }
        }));
      }
    }
    return next.handle(req);
  }
开发者ID:AtlasOfLivingAustralia,项目名称:seasonal-calendar,代码行数:15,代码来源:token-interceptor.ts


示例7: canActivate

    canActivate( route: ActivatedRouteSnapshot, state: RouterStateSnapshot): Observable<boolean> | boolean {
        console.log('auth guard: can activate ...');
        return this.oidcSecurityService.getIsAuthorized()
        .map((isAuthorized: boolean) => {
            if ( isAuthorized ) {
                console.log(state.url);
                return true;                
            }
            this.redirectUrl = state.url;
            console.log('auth guard: redirect to login:');
            // this.oidcSecurityService.authorize();
            this.router.navigate(['autologin'], {queryParams: { returnUrl: state.url }});
            console.log(state.url);
            return false;
        });

        

        // return this.getAuthorized(state.url);
    }
开发者ID:level2000,项目名称:Main,代码行数:20,代码来源:auth-guard.service.ts


示例8: OpenIDImplicitFlowConfiguration

     this.oidcConfigService.onConfigurationLoaded.subscribe(() => {
      const openIDImplicitFlowConfiguration = new OpenIDImplicitFlowConfiguration();
      openIDImplicitFlowConfiguration.stsServer = this.oidcConfigService.clientConfiguration.stsServer;
      openIDImplicitFlowConfiguration.redirect_url = this.oidcConfigService.clientConfiguration.redirect_url;
      // The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer
      // identified by the iss (issuer) Claim as an audience.
      // The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience,
      // or if it contains additional audiences not trusted by the Client.
      openIDImplicitFlowConfiguration.client_id = this.oidcConfigService.clientConfiguration.client_id;
      openIDImplicitFlowConfiguration.response_type = this.oidcConfigService.clientConfiguration.response_type;
      openIDImplicitFlowConfiguration.scope = this.oidcConfigService.clientConfiguration.scope;
      openIDImplicitFlowConfiguration.post_logout_redirect_uri = this.oidcConfigService.clientConfiguration.post_logout_redirect_uri;
      openIDImplicitFlowConfiguration.start_checksession = this.oidcConfigService.clientConfiguration.start_checksession;
      openIDImplicitFlowConfiguration.silent_renew = this.oidcConfigService.clientConfiguration.silent_renew;
      openIDImplicitFlowConfiguration.silent_renew_url = this.oidcConfigService.clientConfiguration.silent_renew_url;
      openIDImplicitFlowConfiguration.post_login_route = this.oidcConfigService.clientConfiguration.startup_route;
      // HTTP 403
      openIDImplicitFlowConfiguration.forbidden_route = this.oidcConfigService.clientConfiguration.forbidden_route;
      // HTTP 401
      openIDImplicitFlowConfiguration.unauthorized_route = this.oidcConfigService.clientConfiguration.unauthorized_route;
      openIDImplicitFlowConfiguration.log_console_warning_active = this.oidcConfigService.clientConfiguration.log_console_warning_active;
      openIDImplicitFlowConfiguration.log_console_debug_active = this.oidcConfigService.clientConfiguration.log_console_debug_active;
      // id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,
      // limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.
      openIDImplicitFlowConfiguration.max_id_token_iat_offset_allowed_in_seconds = this.oidcConfigService.clientConfiguration.max_id_token_iat_offset_allowed_in_seconds;

      const authWellKnownEndpoints = new AuthWellKnownEndpoints();
      authWellKnownEndpoints.setWellKnownEndpoints(
        this.oidcConfigService.wellKnownEndpoints
      );

      this.oidcSecurityService.setupModule(
        openIDImplicitFlowConfiguration,
        authWellKnownEndpoints
      );

      
    });
开发者ID:ArmyMusicOnline,项目名称:ami,代码行数:38,代码来源:app.module.ts


示例9: onModuleSetup

 private onModuleSetup() {
   this.oidcSecurityService.authorize();
 }
开发者ID:ArmyMusicOnline,项目名称:ami,代码行数:3,代码来源:auto-login.component.ts


示例10:

 window.addEventListener("sc-login-message", (evt: CustomEvent) => {
   console.log("sc-login-message", evt.detail);
   this.oidcSecurityService.authorizedCallback(evt.detail)
 });
开发者ID:AtlasOfLivingAustralia,项目名称:seasonal-calendar,代码行数:4,代码来源:app.module.ts


示例11: logout

 logout() {
   console.log('start logoff');
   this.oidcSecurityService.logoff();
 }
开发者ID:ArmyMusicOnline,项目名称:ami,代码行数:4,代码来源:app.component.ts


示例12: refreshSession

 refreshSession() {
   console.log('start refreshSession');
   this.oidcSecurityService.authorize();
 }
开发者ID:ArmyMusicOnline,项目名称:ami,代码行数:4,代码来源:app.component.ts


示例13: login

 login() {
   console.log('start login');
   this.oidcSecurityService.authorize();
 }
开发者ID:ArmyMusicOnline,项目名称:ami,代码行数:4,代码来源:app.component.ts



注:本文中的angular-auth-oidc-client.OidcSecurityService类示例由纯净天空整理自Github/MSDocs等源码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。


鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
热门推荐
热门话题
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap