@@ -97,19 +97,19 @@ of those three can be a callable) must be passed here directly and classes
97
97
must be instantiated (callables should accept request as their only argument).
98
98
99
99
GRANT_MODEL
100
- ~~~~~~~~~~~~~~~~~
100
+ ~~~~~~~~~~~
101
101
The import string of the class (model) representing your grants. Overwrite
102
102
this value if you wrote your own implementation (subclass of
103
103
``oauth2_provider.models.Grant ``).
104
104
105
105
APPLICATION_ADMIN_CLASS
106
- ~~~~~~~~~~~~~~~~~
106
+ ~~~~~~~~~~~~~~~~~~~~~~~
107
107
The import string of the class (model) representing your application admin class.
108
108
Overwrite this value if you wrote your own implementation (subclass of
109
109
``oauth2_provider.admin.ApplicationAdmin ``).
110
110
111
111
ACCESS_TOKEN_ADMIN_CLASS
112
- ~~~~~~~~~~~~~~~~~
112
+ ~~~~~~~~~~~~~~~~~~~~~~~~
113
113
The import string of the class (model) representing your access token admin class.
114
114
Overwrite this value if you wrote your own implementation (subclass of
115
115
``oauth2_provider.admin.AccessTokenAdmin ``).
@@ -121,7 +121,7 @@ Overwrite this value if you wrote your own implementation (subclass of
121
121
``oauth2_provider.admin.GrantAdmin ``).
122
122
123
123
REFRESH_TOKEN_ADMIN_CLASS
124
- ~~~~~~~~~~~~~~~~~
124
+ ~~~~~~~~~~~~~~~~~~~~~~~~~
125
125
The import string of the class (model) representing your refresh token admin class.
126
126
Overwrite this value if you wrote your own implementation (subclass of
127
127
``oauth2_provider.admin.RefreshTokenAdmin ``).
@@ -154,7 +154,7 @@ If you don't change the validator code and don't run cleartokens all refresh
154
154
tokens will last until revoked or the end of time. You should change this.
155
155
156
156
REFRESH_TOKEN_GRACE_PERIOD_SECONDS
157
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
157
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
158
158
The number of seconds between when a refresh token is first used when it is
159
159
expired. The most common case of this for this is native mobile applications
160
160
that run into issues of network connectivity during the refresh cycle and are
@@ -178,7 +178,7 @@ See also: validator's rotate_refresh_token method can be overridden to make this
178
178
when close to expiration, theoretically).
179
179
180
180
REFRESH_TOKEN_GENERATOR
181
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
181
+ ~~~~~~~~~~~~~~~~~~~~~~~
182
182
See `ACCESS_TOKEN_GENERATOR `. This is the same but for refresh tokens.
183
183
Defaults to access token generator if not provided.
184
184
@@ -265,7 +265,7 @@ Default: ``""``
265
265
The RSA private key used to sign OIDC ID tokens. If not set, OIDC is disabled.
266
266
267
267
OIDC_RSA_PRIVATE_KEYS_INACTIVE
268
- ~~~~~~~~~~~~~~~~~~~~
268
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
269
269
Default: ``[] ``
270
270
271
271
An array of *inactive * RSA private keys. These keys are not used to sign tokens,
@@ -276,7 +276,7 @@ This is useful for providing a smooth transition during key rotation.
276
276
should be retained in this inactive list.
277
277
278
278
OIDC_JWKS_MAX_AGE_SECONDS
279
- ~~~~~~~~~~~~~~~~~~~~~~
279
+ ~~~~~~~~~~~~~~~~~~~~~~~~~
280
280
Default: ``3600 ``
281
281
282
282
The max-age value for the Cache-Control header on jwks_uri.
@@ -354,9 +354,9 @@ load when clearing large batches of expired tokens.
354
354
355
355
356
356
Settings imported from Django project
357
- --------------------------
357
+ -------------------------------------
358
358
359
359
USE_TZ
360
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
360
+ ~~~~~~
361
361
362
362
Used to determine whether or not to make token expire dates timezone aware.
0 commit comments