diff --git a/CHANGELOG.md b/CHANGELOG.md index 673298a0..4f837fd4 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -18,6 +18,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0 - Clarified how process exceptions should be used. [#352](https://github.com/Open-EO/openeo-api/issues/352) - Clarified that billing plans, service names and file formats must be accepted case-insensitive. [#371](https://github.com/Open-EO/openeo-api/issues/371) +- Clarified that the first provider listed at `GET /credentials/oidc` is the default provider for OpenID Connect. - Fixed casing of potential endpoints `GET /collections/{collection_id}/items` and `GET /collections/{collection_id}/items/{feature_id}`. ## 1.0.1 - 2020-12-07 diff --git a/openapi.yaml b/openapi.yaml index 923aa998..b190ea34 100644 --- a/openapi.yaml +++ b/openapi.yaml @@ -1711,16 +1711,14 @@ paths: get: summary: OpenID Connect authentication operationId: authenticate-oidc - description: >- + description: |- Lists the supported [OpenID Connect](http://openid.net/connect/) providers (OP). OpenID Connect Providers MUST support [OpenID Connect Discovery](http://openid.net/specs/openid-connect-discovery-1_0.html). - It is highly RECOMMENDED to implement OpenID Connect for public services in favor of Basic authentication. - openEO clients MUST use the **access token** as part of the Bearer token for authorization in subsequent API calls (see also the information about Bearer tokens in this document). Clients MUST NOT use the id token @@ -1737,7 +1735,6 @@ paths: (replace `TOKEN` with the actual access token received from the OpenID Connect Provider). - Back-ends MAY request user information ([including Claims](https://openid.net/specs/openid-connect-core-1_0.html#Claims)) from the [OpenID Connect Userinfo endpoint](https://openid.net/specs/openid-connect-core-1_0.html#UserInfo) using the access token (without the prefix described above). Therefore, @@ -1760,6 +1757,10 @@ paths: properties: providers: type: array + description: >- + The first provider in this list is the default provider for authentication. + Clients can either pre-select or directly use the default provider for authentication + if the user doesn't specify a specific value. minItems: 1 items: title: OpenID Connect Provider @@ -1891,6 +1892,23 @@ paths: $ref: '#/components/schemas/link' example: providers: + - id: egi + issuer: 'https://aai.egi.eu/oidc' + title: EGI (default) + description: Login with your academic account. + scopes: + - openid + - profile + - email + default_clients: + - id: KStcUzD5AIUA + grant_types: + - implicit + - authorization_code+pkce + - urn:ietf:params:oauth:grant-type:device_code+pkce + - refresh_token + redirect_urls: + - https://editor.openeo.org/ - id: google issuer: 'https://accounts.google.com' title: Google