Ephemeral-client (Section)#

Path: /profiles/profile{id, type}/settings/authorization-server/ephemeral-client

Enables the Ephemeral clients feature.

Parameters#

NameTypeRequiredDefaultDescription
require-secured-authorization-responseemptyoptionalIf set, then all authorization responses need to be protected according to the ‘JWT Secured Authorization Response Mode for OAuth 2.0’ (JARM) specification
require-request-objectemptyoptionalIf set, all authorization requests made by ephemeral clients must include a request object
require-id-token-encryptionemptyoptionalIf set, ephemeral clients must register with ID token encryption settings. Requires OpenId Connect to be enabled for the profile and the openid scope to be allowed by ephemeral clients.
access-token-ttltoken-time-to-liveoptional300The number of seconds an access token will be valid
refresh-token-ttldisablable-token-time-to-liveoptional3600The number of seconds a refresh token will be valid. If set to ‘disabled’, no refresh tokens will be issued
refresh-token-max-rolling-lifetimedisablable-token-time-to-liveoptionalWhen set, the refresh-token-ttl is used to set the expiration of new refresh tokens, until this max value is reached.
reuse-refresh-tokensbooleanoptionalDefines if refresh tokens are created on every refresh or if they are kept, when set this takes precedence over profile setting (reuse-refresh-tokens), when not set profile setting applies
id-token-ttltoken-time-to-liveoptionalThe number of seconds an id token will be valid. If not set, the profile-setting is used.
require-pushed-authorization-requestsemptyoptionalClients must use PARs; if this is not enabled here, the profile settings for require-pushed-authorization-requests are followed.
localhost-allowedemptyoptionalIf enabled, allows ephemeral client IDs to be localhost or loopback addresses.
http-clientleafrefoptionalThe client that will be used to fetch the client ID metadata documents and possibly other resources (i.e. JWKS for client authentication). If not set, the default HTTP client will be used

Subsections#

NameTypeDescription
capabilities SectionNone
client-authentication-method SectionConfigures how ephemeral clients can authenticate to token, introspect, etc. endpoints.
scopes SectionThe scopes that ephemeral clients may request.
authenticators SectionThe authenticators that ephemeral clients may authenticate with
cache SectionEnable caching of Client ID metadata documents
client-id-restrictions SectionRules to restrict what client IDs for ephemeral clients will the server accept.
user-consent SectionWhen set, the user is asked to accept the delegation via a consent screen.

Was this helpful?