You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
== Opaque Token Credentials Will Be Encoded For You
4
-
5
-
In order to comply more closely with the Introspection RFC, Spring Security's opaque token support will encode the client id and secret before creating the authorization header.
6
-
This change means you will no longer have to encode the client id and secret yourself.
7
-
8
-
If your client id or secret contain URL-unsafe characters, then you can prepare yourself for this change by doing the following:
9
-
10
-
=== Replace Usage of `introspectionClientCredentials`
11
-
12
-
Since Spring Security can now do the encoding for you, replace xref:servlet/oauth2/resource-server/opaque-token.adoc#oauth2resourceserver-opaque-introspectionuri-dsl[using `introspectionClientCredentials`] with publishing the following `@Bean`:
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/migration-7/oauth2.adoc
+67Lines changed: 67 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -170,3 +170,70 @@ fun jwtDecoder(): JwtDecoder {
170
170
<2> - specify the list of validators you need, excluding `JwtTypeValidator`
171
171
172
172
For additional guidance, please see the xref:servlet/oauth2/resource-server/jwt.adoc#oauth2resourceserver-jwt-validation[JwtDecoder Validators] section in the reference.
173
+
174
+
== Opaque Token Credentials Will Be Encoded For You
175
+
176
+
In order to comply more closely with the Introspection RFC, Spring Security's opaque token support will encode the client id and secret before creating the authorization header.
177
+
This change means you will no longer have to encode the client id and secret yourself.
178
+
179
+
If your client id or secret contain URL-unsafe characters, then you can prepare yourself for this change by doing the following:
180
+
181
+
=== Replace Usage of `introspectionClientCredentials`
182
+
183
+
Since Spring Security can now do the encoding for you, replace xref:servlet/oauth2/resource-server/opaque-token.adoc#oauth2resourceserver-opaque-introspectionuri-dsl[using `introspectionClientCredentials`] with publishing the following `@Bean`:
0 commit comments