Page created: 9 Oct 2020
|
Page updated: 10 Oct 2020
The OpenID Connect 1.0 Implicit Client Profile uses the OAuth 2.0 "Implicit" grant type. The flow is almost identical to the OAuth 2.0 implicit flow with the exception of the "openid" scope and the tokens returned.
This section provides an example of using OpenID Connect Implicit Client Profile to retrieve an OpenID Connect id_token, validate the contents (steps 1 and 2 in the diagram below) and then query the UserInfo endpoint to retrieve profile information about the user (step 3).
This example assumes PingFederate 7.3 or higher is installed with the OAuth 2.0 Playground developer tool. The following configuration will be used:
PingFederate server base URL | https://localhost:9031 |
OAuth 2.0 client_id | m_oic_client |
OAuth 2.0 client_secret | < none > |
Application callback URI | https://localhost:9031/OAuthPlayground/case2A-callback.jsp |
Note: For native mobile applications, the callback URI may be a non-http URI. This is configured in your application settings and will cause the mobile application to be launched to process the callback.