You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+2
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,8 @@
8
8
- A [`Cross-Origin-Opener-Policy`](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cross-Origin-Opener-Policy) resilient method of acquiring tokens using via external IDPs.
9
9
- See [documentation](https://github.com/okta/okta-auth-js?tab=readme-ov-file#tokengetwithidppopupoptions) for more detailed explanation
Copy file name to clipboardExpand all lines: README.md
+18
Original file line number
Diff line number
Diff line change
@@ -415,6 +415,10 @@ const config = {
415
415
// other configurations
416
416
pkce:true, // required
417
417
dpop:true,
418
+
dpopOptions: {
419
+
// set to `true` to skip the validation to check the resulting token response includes `token_type: DPoP`
420
+
allowBearerTokens:false// defaults to `false`, tokens are validated to include `token_type: DPoP`
421
+
}
418
422
};
419
423
420
424
constauthClient=newOktaAuth(config);
@@ -575,6 +579,20 @@ Default value is `false`. Set to `true` to enable `DPoP` (Demonstrating Proof-of
575
579
576
580
See Guide: [Enabling DPoP](#enabling-dpop)
577
581
582
+
#### `dpopOptions`
583
+
584
+
Default value:
585
+
```javascript
586
+
dpopOptions: {
587
+
allowBearerTokens:false
588
+
}
589
+
```
590
+
591
+
See Guide: [Enabling DPoP](#enabling-dpop)
592
+
593
+
#### `dpopOptions.allowBearerTokens`
594
+
595
+
When `false`, dpop-enabled token requests are validated to contain `token_type: DPoP` and will throw otherwise. Set to `true` to skip this validation and allow `Bearer` tokens as a possible `token_type`. This can be useful during a migration, to avoid needing to update a web application simutaneously with Okta Org configurations. Defaults to `false`
0 commit comments