Skip to content

Commit

Permalink
Merge pull request #543 from DuendeSoftware/use-duende-demo-server
Browse files Browse the repository at this point in the history
  • Loading branch information
josephdecock authored Nov 13, 2024
2 parents 27ebd1c + 49bd46a commit 5aac02a
Show file tree
Hide file tree
Showing 14 changed files with 26 additions and 26 deletions.
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel.OidcClient/automatic.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ interface:
```
var options = new OidcClientOptions
{
Authority = "https://demo.identityserver.io",
Authority = "https://demo.duendesoftware.com",
ClientId = "native",
RedirectUri = redirectUri,
Scope = "openid profile api",
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel.OidcClient/manual.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ browser you want to use, e.g.:
```
var options = new OidcClientOptions
{
Authority = "https://demo.identityserver.io",
Authority = "https://demo.duendesoftware.com",
ClientId = "native",
RedirectUri = redirectUri,
Scope = "openid profile api"
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel/endpoints/device_authorize.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ var client = new HttpClient();
var response = await client.RequestDeviceAuthorizationAsync(new DeviceAuthorizationRequest
{
Address = "https://demo.identityserver.io/connect/device_authorize",
Address = "https://demo.duendesoftware.com/connect/device_authorize",
ClientId = "device"
});
```
Expand Down
8 changes: 4 additions & 4 deletions FOSS/content/IdentityModel/endpoints/discovery.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Example:
```
var client = new HttpClient();
var disco = await client.GetDiscoveryDocumentAsync("https://demo.identityserver.io");
var disco = await client.GetDiscoveryDocumentAsync("https://demo.duendesoftware.com");
if (disco.IsError) throw new Exception(disco.Error);
```

Expand Down Expand Up @@ -67,7 +67,7 @@ All of the standard validation rules can be modified using the
```
var disco = await client.GetDiscoveryDocumentAsync(new DiscoveryDocumentRequest
{
Address = "https://demo.identityserver.io",
Address = "https://demo.duendesoftware.com",
Policy =
{
ValidateIssuerName = false
Expand All @@ -82,7 +82,7 @@ comparison uses ordinal string comparison. To switch to Uri comparison:
```
var disco = await client.GetDiscoveryDocumentAsync(new DiscoveryDocumentRequest
{
Address = "https://demo.identityserver.io",
Address = "https://demo.duendesoftware.com",
Policy =
{
AuthorityValidationStrategy = new AuthorityUrlValidationStrategy()
Expand All @@ -104,7 +104,7 @@ The following code will set-up the cache, retrieve the document the
first time it is needed, and then cache it for 24 hours:

```
var cache = new DiscoveryCache("https://demo.identityserver.io");
var cache = new DiscoveryCache("https://demo.duendesoftware.com");
```

You can then access the document like this:
Expand Down
6 changes: 3 additions & 3 deletions FOSS/content/IdentityModel/endpoints/general_usage.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ grant type:
```cs
var request = new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "client",
ClientSecret = "secret"
};
Expand Down Expand Up @@ -69,7 +69,7 @@ var client = new HttpClient();
var response = await client.RequestClientCredentialsTokenAsync(
new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "client",
ClientSecret = "secret"
});
Expand All @@ -84,7 +84,7 @@ var client = HttpClientFactory.CreateClient("my_named_token_client");
var response = await client.RequestClientCredentialsTokenAsync(
new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "client",
ClientSecret = "secret"
});
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel/endpoints/introspection.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ var client = new HttpClient();
var response = await client.IntrospectTokenAsync(new TokenIntrospectionRequest
{
Address = "https://demo.identityserver.io/connect/introspect",
Address = "https://demo.duendesoftware.com/connect/introspect",
ClientId = "api1",
ClientSecret = "secret",
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel/endpoints/revocation.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ var client = new HttpClient();
var result = await client.RevokeTokenAsync(new TokenRevocationRequest
{
Address = "https://demo.identityserver.io/connect/revocation",
Address = "https://demo.duendesoftware.com/connect/revocation",
ClientId = "client",
ClientSecret = "secret",
Expand Down
6 changes: 3 additions & 3 deletions FOSS/content/IdentityModel/endpoints/token.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ var client = new HttpClient();
var response = await client.RequestTokenAsync(new TokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
GrantType = "custom",
ClientId = "client",
Expand Down Expand Up @@ -63,7 +63,7 @@ properties for the *client_credentials* grant type:
```
var response = await client.RequestClientCredentialsTokenAsync(new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "client",
ClientSecret = "secret",
Expand All @@ -80,7 +80,7 @@ for the *password* grant type:
```
var response = await client.RequestPasswordTokenAsync(new PasswordTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "client",
ClientSecret = "secret",
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel/utils/request_url.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ public static string CreateAuthorizeUrl(this RequestUrl request,
Example:

```
var ru = new RequestUrl("https://demo.identityserver.io/connect/authorize");
var ru = new RequestUrl("https://demo.duendesoftware.com/connect/authorize");
var url = ru.CreateAuthorizeUrl(
clientId: "client",
Expand Down
8 changes: 4 additions & 4 deletions FOSS/outtakes/aspnetcore/web.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ client that automatically uses the token management library:
```
services.AddUserAccessTokenClient("user_client", client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
});
```

Expand All @@ -75,7 +75,7 @@ services.AddAuthentication(options =>
})
.AddOpenIdConnect("oidc", options =>
{
options.Authority = "https://demo.identityserver.io";
options.Authority = "https://demo.duendesoftware.com";
options.ClientId = "interactive.confidential.short";
options.ClientSecret = "secret";
Expand Down Expand Up @@ -119,13 +119,13 @@ services.AddAccessTokenManagement(options =>
// registers HTTP client that uses the managed user access token
services.AddUserAccessTokenClient("user_client", client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
});
// registers HTTP client that uses the managed client access token
services.AddClientAccessTokenClient("client", configureClient: client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
});
```

Expand Down
6 changes: 3 additions & 3 deletions FOSS/outtakes/aspnetcore/worker.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ var host = Host.CreateDefaultBuilder(args)
{
options.Client.Clients.Add("identityserver", new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "m2m.short",
ClientSecret = "secret",
Scope = "api" // optional
Expand Down Expand Up @@ -60,7 +60,7 @@ management is by calling *AddClientAccessTokenHttpClient*:
```
services.AddClientAccessTokenHttpClient("client", configureClient: client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
});
```

Expand All @@ -76,7 +76,7 @@ optionally also takes a token client name), e.g. a typed client:
```
services.AddHttpClient<MyClient>(client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
})
.AddClientAccessTokenHandler();
```
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ The [discovery endpoint](https://openid.net/specs/openid-connect-discovery-1_0.h

The discovery endpoint is available via */.well-known/openid-configuration* relative to the base address, e.g.:

https://demo.identityserver.io/.well-known/openid-configuration
https://demo.duendesoftware.com/.well-known/openid-configuration

## .NET client library
You can use the [IdentityModel](https://identitymodel.readthedocs.io) client library to programmatically interact with the protocol endpoint from .NET code.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ The [discovery endpoint](https://openid.net/specs/openid-connect-discovery-1_0.h

The discovery endpoint is available via */.well-known/openid-configuration* relative to the base address, e.g.:

https://demo.identityserver.io/.well-known/openid-configuration
https://demo.duendesoftware.com/.well-known/openid-configuration

## .NET client library
You can use the [IdentityModel](https://identitymodel.readthedocs.io) client library to programmatically interact with the protocol endpoint from .NET code.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ The [discovery endpoint](https://openid.net/specs/openid-connect-discovery-1_0.h

The discovery endpoint is available via */.well-known/openid-configuration* relative to the base address, e.g.:

https://demo.identityserver.io/.well-known/openid-configuration
https://demo.duendesoftware.com/.well-known/openid-configuration

## .NET client library
You can use the [IdentityModel](https://identitymodel.readthedocs.io) client library to programmatically interact with the protocol endpoint from .NET code.
Expand Down

0 comments on commit 5aac02a

Please sign in to comment.