diff --git a/src/css/style.css b/src/css/style.css index 9a21c9d..9dd210c 100644 --- a/src/css/style.css +++ b/src/css/style.css @@ -188,4 +188,9 @@ pre { .section-header { text-align: center; +} + +.centered { + text-align: center; + width: 100%; } \ No newline at end of file diff --git a/src/flow/code-1.html b/src/flow/code-1.html index d820959..a89a80a 100644 --- a/src/flow/code-1.html +++ b/src/flow/code-1.html @@ -55,17 +55,11 @@
?
- &
- &
- &
- &
- &
+
+
URL of the authorization endpoint on the server. How is this path constructed will differ between OAuth providers (such as Keycloak or Okta). to @@ -75,31 +69,31 @@
response_type=
+response_type=
OAuth 2.0 response type. In this case, we are using the Authorization Code flow, so we are requesting the authorization code.
client_id=
+client_id=
Client ID of the application. This is a public identifier for the client, and it is used by the authorization server to identify the application when redirecting the user back to the client.
redirect_uri=
+redirect_uri=
Redirect URI of the client. This is the URL that the authorization server will redirect the user back to after the user has logged in and granted permissions. The redirect URI must match one of the URIs registered for the client ID.
scope=
+scope=
Scopes requested by the client. Scopes are used to limit the access of the access token. In this case, we are requesting the offline_access scope, which allows the client to obtain a refresh token.
state=
+state=
State parameter. This is an optional parameter that the client can use to maintain state between the request and callback. The authorization server includes this parameter when redirecting the user back to the client, @@ -116,10 +110,13 @@