Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use demo.duendesoftware.com everywhere #543

Merged
merged 1 commit into from
Nov 13, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel.OidcClient/automatic.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ interface:
```
var options = new OidcClientOptions
{
Authority = "https://demo.identityserver.io",
Authority = "https://demo.duendesoftware.com",
ClientId = "native",
RedirectUri = redirectUri,
Scope = "openid profile api",
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel.OidcClient/manual.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ browser you want to use, e.g.:
```
var options = new OidcClientOptions
{
Authority = "https://demo.identityserver.io",
Authority = "https://demo.duendesoftware.com",
ClientId = "native",
RedirectUri = redirectUri,
Scope = "openid profile api"
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel/endpoints/device_authorize.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ var client = new HttpClient();

var response = await client.RequestDeviceAuthorizationAsync(new DeviceAuthorizationRequest
{
Address = "https://demo.identityserver.io/connect/device_authorize",
Address = "https://demo.duendesoftware.com/connect/device_authorize",
ClientId = "device"
});
```
Expand Down
8 changes: 4 additions & 4 deletions FOSS/content/IdentityModel/endpoints/discovery.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Example:
```
var client = new HttpClient();

var disco = await client.GetDiscoveryDocumentAsync("https://demo.identityserver.io");
var disco = await client.GetDiscoveryDocumentAsync("https://demo.duendesoftware.com");
if (disco.IsError) throw new Exception(disco.Error);
```

Expand Down Expand Up @@ -67,7 +67,7 @@ All of the standard validation rules can be modified using the
```
var disco = await client.GetDiscoveryDocumentAsync(new DiscoveryDocumentRequest
{
Address = "https://demo.identityserver.io",
Address = "https://demo.duendesoftware.com",
Policy =
{
ValidateIssuerName = false
Expand All @@ -82,7 +82,7 @@ comparison uses ordinal string comparison. To switch to Uri comparison:
```
var disco = await client.GetDiscoveryDocumentAsync(new DiscoveryDocumentRequest
{
Address = "https://demo.identityserver.io",
Address = "https://demo.duendesoftware.com",
Policy =
{
AuthorityValidationStrategy = new AuthorityUrlValidationStrategy()
Expand All @@ -104,7 +104,7 @@ The following code will set-up the cache, retrieve the document the
first time it is needed, and then cache it for 24 hours:

```
var cache = new DiscoveryCache("https://demo.identityserver.io");
var cache = new DiscoveryCache("https://demo.duendesoftware.com");
```

You can then access the document like this:
Expand Down
6 changes: 3 additions & 3 deletions FOSS/content/IdentityModel/endpoints/general_usage.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ grant type:
```cs
var request = new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "client",
ClientSecret = "secret"
};
Expand Down Expand Up @@ -69,7 +69,7 @@ var client = new HttpClient();
var response = await client.RequestClientCredentialsTokenAsync(
new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "client",
ClientSecret = "secret"
});
Expand All @@ -84,7 +84,7 @@ var client = HttpClientFactory.CreateClient("my_named_token_client");
var response = await client.RequestClientCredentialsTokenAsync(
new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "client",
ClientSecret = "secret"
});
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel/endpoints/introspection.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ var client = new HttpClient();

var response = await client.IntrospectTokenAsync(new TokenIntrospectionRequest
{
Address = "https://demo.identityserver.io/connect/introspect",
Address = "https://demo.duendesoftware.com/connect/introspect",
ClientId = "api1",
ClientSecret = "secret",

Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel/endpoints/revocation.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ var client = new HttpClient();

var result = await client.RevokeTokenAsync(new TokenRevocationRequest
{
Address = "https://demo.identityserver.io/connect/revocation",
Address = "https://demo.duendesoftware.com/connect/revocation",
ClientId = "client",
ClientSecret = "secret",

Expand Down
6 changes: 3 additions & 3 deletions FOSS/content/IdentityModel/endpoints/token.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ var client = new HttpClient();

var response = await client.RequestTokenAsync(new TokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
GrantType = "custom",

ClientId = "client",
Expand Down Expand Up @@ -63,7 +63,7 @@ properties for the *client_credentials* grant type:
```
var response = await client.RequestClientCredentialsTokenAsync(new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",

ClientId = "client",
ClientSecret = "secret",
Expand All @@ -80,7 +80,7 @@ for the *password* grant type:
```
var response = await client.RequestPasswordTokenAsync(new PasswordTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",

ClientId = "client",
ClientSecret = "secret",
Expand Down
2 changes: 1 addition & 1 deletion FOSS/content/IdentityModel/utils/request_url.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ public static string CreateAuthorizeUrl(this RequestUrl request,
Example:

```
var ru = new RequestUrl("https://demo.identityserver.io/connect/authorize");
var ru = new RequestUrl("https://demo.duendesoftware.com/connect/authorize");

var url = ru.CreateAuthorizeUrl(
clientId: "client",
Expand Down
8 changes: 4 additions & 4 deletions FOSS/outtakes/aspnetcore/web.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ client that automatically uses the token management library:
```
services.AddUserAccessTokenClient("user_client", client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
});
```

Expand All @@ -75,7 +75,7 @@ services.AddAuthentication(options =>
})
.AddOpenIdConnect("oidc", options =>
{
options.Authority = "https://demo.identityserver.io";
options.Authority = "https://demo.duendesoftware.com";

options.ClientId = "interactive.confidential.short";
options.ClientSecret = "secret";
Expand Down Expand Up @@ -119,13 +119,13 @@ services.AddAccessTokenManagement(options =>
// registers HTTP client that uses the managed user access token
services.AddUserAccessTokenClient("user_client", client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
});

// registers HTTP client that uses the managed client access token
services.AddClientAccessTokenClient("client", configureClient: client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
});
```

Expand Down
6 changes: 3 additions & 3 deletions FOSS/outtakes/aspnetcore/worker.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ var host = Host.CreateDefaultBuilder(args)
{
options.Client.Clients.Add("identityserver", new ClientCredentialsTokenRequest
{
Address = "https://demo.identityserver.io/connect/token",
Address = "https://demo.duendesoftware.com/connect/token",
ClientId = "m2m.short",
ClientSecret = "secret",
Scope = "api" // optional
Expand Down Expand Up @@ -60,7 +60,7 @@ management is by calling *AddClientAccessTokenHttpClient*:
```
services.AddClientAccessTokenHttpClient("client", configureClient: client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
});
```

Expand All @@ -76,7 +76,7 @@ optionally also takes a token client name), e.g. a typed client:
```
services.AddHttpClient<MyClient>(client =>
{
client.BaseAddress = new Uri("https://demo.identityserver.io/api/");
client.BaseAddress = new Uri("https://demo.duendesoftware.com/api/");
})
.AddClientAccessTokenHandler();
```
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ The [discovery endpoint](https://openid.net/specs/openid-connect-discovery-1_0.h

The discovery endpoint is available via */.well-known/openid-configuration* relative to the base address, e.g.:

https://demo.identityserver.io/.well-known/openid-configuration
https://demo.duendesoftware.com/.well-known/openid-configuration

## .NET client library
You can use the [IdentityModel](https://identitymodel.readthedocs.io) client library to programmatically interact with the protocol endpoint from .NET code.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ The [discovery endpoint](https://openid.net/specs/openid-connect-discovery-1_0.h

The discovery endpoint is available via */.well-known/openid-configuration* relative to the base address, e.g.:

https://demo.identityserver.io/.well-known/openid-configuration
https://demo.duendesoftware.com/.well-known/openid-configuration

## .NET client library
You can use the [IdentityModel](https://identitymodel.readthedocs.io) client library to programmatically interact with the protocol endpoint from .NET code.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ The [discovery endpoint](https://openid.net/specs/openid-connect-discovery-1_0.h

The discovery endpoint is available via */.well-known/openid-configuration* relative to the base address, e.g.:

https://demo.identityserver.io/.well-known/openid-configuration
https://demo.duendesoftware.com/.well-known/openid-configuration

## .NET client library
You can use the [IdentityModel](https://identitymodel.readthedocs.io) client library to programmatically interact with the protocol endpoint from .NET code.
Expand Down
Loading