@@ -57,20 +57,19 @@ POST /_security/oidc/prepare
5757}
5858--------------------------------------------------
5959// CONSOLE
60- // TEST[skip:These are properly tested in the OpenIDConnectIT suite]
61-
6260The following example output of the response contains the URI pointing to the Authorization Endpoint of the
6361OpenID Connect Provider with all the parameters of the Authentication Request, as HTTP GET parameters
6462
6563[source,js]
6664--------------------------------------------------
6765{
68- "redirect" : "https ://op-provider.org/ login?scope=openid&response_type=code &redirect_uri=http %3A%2F%2Foidc-kibana.elastic.co%3A5603%2Fkmi%2Fapi%2Fsecurity%2Fv1%2Foidc &state=4dbrihtIAt3wBTwo6DxK-vdk-sSyDBV8Yf0AjdkdT5I&nonce=WaBPH0KqPVdG5HHdSxPRjfoZbXMCicm5v1OiAj0DUFM&client_id=0o43gasov3TxMWJOt839 ",
66+ "redirect" : "http ://127.0.0.1:8080/c2id- login?scope=openid&response_type=id_token &redirect_uri=https %3A%2F%2Fmy.fantastic.rp%2Fcb &state=4dbrihtIAt3wBTwo6DxK-vdk-sSyDBV8Yf0AjdkdT5I&nonce=WaBPH0KqPVdG5HHdSxPRjfoZbXMCicm5v1OiAj0DUFM&client_id=elasticsearch-rp ",
6967 "state" : "4dbrihtIAt3wBTwo6DxK-vdk-sSyDBV8Yf0AjdkdT5I",
7068 "nonce" : "WaBPH0KqPVdG5HHdSxPRjfoZbXMCicm5v1OiAj0DUFM"
7169}
7270--------------------------------------------------
73- // NOTCONSOLE
71+ // TESTRESPONSE[s/4dbrihtIAt3wBTwo6DxK-vdk-sSyDBV8Yf0AjdkdT5I/\$\{body.state\}/]
72+ // TESTRESPONSE[s/WaBPH0KqPVdG5HHdSxPRjfoZbXMCicm5v1OiAj0DUFM/\$\{body.nonce\}/]
7473
7574The following example generates an authentication request for the OpenID Connect Realm `oidc1`, where the
7675values for the state and the nonce have been generated by the client
@@ -85,20 +84,19 @@ POST /_security/oidc/prepare
8584}
8685--------------------------------------------------
8786// CONSOLE
88- // TEST[skip:These are properly tested in the OpenIDConnectIT suite]
8987
9088The following example output of the response contains the URI pointing to the Authorization Endpoint of the
9189OpenID Connect Provider with all the parameters of the Authentication Request, as HTTP GET parameters
9290
9391[source,js]
9492--------------------------------------------------
9593{
96- "redirect" : "https ://op-provider.org/ login?scope=openid&response_type=code &redirect_uri=http %3A%2F%2Foidc-kibana.elastic.co%3A5603%2Fkmi%2Fapi%2Fsecurity%2Fv1%2Foidc &state=lGYK0EcSLjqH6pkT5EVZjC6eIW5YCGgywj2sxROO&nonce=zOBXLJGUooRrbLbQk5YCcyC8AXw3iloynvluYhZ5&client_id=0o43gasov3TxMWJOt839 ",
94+ "redirect" : "http ://127.0.0.1:8080/c2id- login?scope=openid&response_type=id_token &redirect_uri=https %3A%2F%2Fmy.fantastic.rp%2Fcb &state=lGYK0EcSLjqH6pkT5EVZjC6eIW5YCGgywj2sxROO&nonce=zOBXLJGUooRrbLbQk5YCcyC8AXw3iloynvluYhZ5&client_id=elasticsearch-rp ",
9795 "state" : "lGYK0EcSLjqH6pkT5EVZjC6eIW5YCGgywj2sxROO",
9896 "nonce" : "zOBXLJGUooRrbLbQk5YCcyC8AXw3iloynvluYhZ5"
9997}
10098--------------------------------------------------
101- // NOTCONSOLE
99+ // TESTRESPONSE
102100
103101The following example generates an authentication request for a 3rd party initiated single sign on, specifying the
104102issuer that should be used for matching the appropriate OpenID Connect Authentication realm
@@ -107,22 +105,22 @@ issuer that should be used for matching the appropriate OpenID Connect Authentic
107105--------------------------------------------------
108106POST /_security/oidc/prepare
109107{
110- "issuer " : "https ://op-issuer.org:8800 ",
108+ "iss " : "http ://127.0.0.1:8080 ",
111109 "login_hint": "this_is_an_opaque_string"
112110}
113111--------------------------------------------------
114112// CONSOLE
115- // TEST[skip:These are properly tested in the OpenIDConnectIT suite]
116113
117114The following example output of the response contains the URI pointing to the Authorization Endpoint of the
118115OpenID Connect Provider with all the parameters of the Authentication Request, as HTTP GET parameters
119116
120117[source,js]
121118--------------------------------------------------
122119{
123- "redirect" : "https ://op-provider.org/ login?scope=openid&response_type=code &redirect_uri=http %3A%2F%2Foidc-kibana.elastic.co%3A5603%2Fkmi%2Fapi%2Fsecurity%2Fv1%2Foidc &state=lGYK0EcSLjqH6pkT5EVZjC6eIW5YCGgywj2sxROO &nonce=zOBXLJGUooRrbLbQk5YCcyC8AXw3iloynvluYhZ5 &client_id=0o43gasov3TxMWJOt839&login_hint=this_is_an_opaque_string ",
120+ "redirect" : "http ://127.0.0.1:8080/c2id- login?login_hint=this_is_an_opaque_string& scope=openid&response_type=id_token &redirect_uri=https %3A%2F%2Fmy.fantastic.rp%2Fcb &state=4dbrihtIAt3wBTwo6DxK-vdk-sSyDBV8Yf0AjdkdT5I &nonce=WaBPH0KqPVdG5HHdSxPRjfoZbXMCicm5v1OiAj0DUFM &client_id=elasticsearch-rp ",
124121 "state" : "4dbrihtIAt3wBTwo6DxK-vdk-sSyDBV8Yf0AjdkdT5I",
125122 "nonce" : "WaBPH0KqPVdG5HHdSxPRjfoZbXMCicm5v1OiAj0DUFM"
126123}
127124--------------------------------------------------
128- // NOTCONSOLE
125+ // TESTRESPONSE[s/4dbrihtIAt3wBTwo6DxK-vdk-sSyDBV8Yf0AjdkdT5I/\$\{body.state\}/]
126+ // TESTRESPONSE[s/WaBPH0KqPVdG5HHdSxPRjfoZbXMCicm5v1OiAj0DUFM/\$\{body.nonce\}/]
0 commit comments