Flask-pyoidc

Latest version: v3.14.3

Safety actively analyzes 688843 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 5 of 6

1.0.0

Not secure
News
- Now supports RP-Initiated logout as defined in [Section 5 of OpenID Connect Session Management](http://openid.net/specs/openid-connect-session-1_0.html#RPLogout).

Fixes
- The `OIDCAuthentication.oidc_auth` decorator now passes all call parameters to the decorated route function, thanks to stevenmirabito.
- Greatly improved session handling, thanks to stevenmirabito.
- The scope sent to the token endpoint will match the scope requested at the authorization endpoint.

Improvements
- Simplified code due to upgrade of the [pyoidc library](https://github.com/rohe/pyoidc).

0.5.0

Not secure
Revert to not keeping any local user session.

Always redirect the user to the OP to ensure the user has a live session with the provider.

0.4.0

Not secure
New feature:
- Allow using the same OIDCAuthentication instance on multiple flask routes.

Improvement:
- Removed some internal data added to the flask.session after it's no longer necessary.

0.3.1

Not secure
Base the user session validity on the ID Token expiration time.

0.3.0

Not secure
Add possibility to add extra arguments to the authentication request to the provider.

0.2.0

Not secure
Add possibility to configure which HTTP method to use for userinfo requests.

Page 5 of 6

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.