A demo page showing the Markdown options
Cumque commodi explicabo voluptatibus tempore et accusamus. Quaerat cumque commodi sunt aut perspiciatis recusandae cumque.
Quia omnis perferendis et occaecati minus dolor quibusdam. Corrupti qui qui nihil sint. Est repellendus sunt optio iure. Velit quia aspernatur sequi ullam neque.
A code example that wraps
<div class="list">
<ol>
<li>How to run the Connect2id server in Docker</li>
<li>Deployment checklist</li>
<li>FAPI checklist</li>
<li>How to evaluate the Connect2id server at a host other than localhost</li>
<li>How to setup a TLS termination proxy for Mutual TLS / X.509 certificate client authentication</li>
<li>How to setup the Connect2id server with global DynamoDB tables, replication strategies</li>
<li>How to setup a multitenant Connect2id server</li>
<li>How to configure and switch between issuer URL aliases</li>
<li>How to migrate Connect2id server data</li>
<li>How to setup an LDAP directory for Connect2id server use</li>
<li>How to migrate to a new LDAP server backend</li>
<li>How to upgrade the OpenLDAP schema for Connect2id server 7.3</li>
<li>How to copy LDAP records from one OpenDJ server to another</li>
</ol>
</div>
A button
Add the class .box
to a link to give it button styling:
A list
Use .list
.
- How to run the Connect2id server in Docker
- Deployment checklist
- FAPI checklist
- How to evaluate the Connect2id server at a host other than localhost
- How to setup a TLS termination proxy for Mutual TLS / X.509 certificate client authentication
- How to setup the Connect2id server with global DynamoDB tables, replication strategies
- How to setup a multitenant Connect2id server
- How to configure and switch between issuer URL aliases
- How to migrate Connect2id server data
- How to setup an LDAP directory for Connect2id server use
- How to migrate to a new LDAP server backend
- How to upgrade the OpenLDAP schema for Connect2id server 7.3
- How to copy LDAP records from one OpenDJ server to another
Table
This is the default table
styling. It gets a responsive wrapper automatically.
Column 1 | Column 2 | Column 3 | Column 4 | Column 5 |
---|---|---|---|---|
Value 1 | Value 2 | Value 3 | Value 4 | Value 5 |
Value 1 | Value 2 | Value 3 | Value 4 | Value 5 |
Value 1 | Value 2 | Value 3 | Value 4 | Value 5 |
Table: column/row headings
If you write custom HTML tables, make sure to wrap them in a div with the responsive-table
class.
Column 1 | Column 2 | Column 3 | Column 4 | |
---|---|---|---|---|
Row 1 | Value 1 | Value 2 | Value 3 | Value 4 |
Row 2 | Value 1 | Value 2 | Value 3 | Value 4 |
Row 3 | Value 1 | Value 2 | Value 3 | Value 4 |
Table: Grouped columns
If you write custom HTML tables, make sure to wrap them in a div with the responsive-table
class. Any th
with the attribute colspan
will automatically get grouped label styling.
Purpose | Json type | |||
---|---|---|---|---|
Policy operator | Modifier | Check | Policy operator | Metadata parameter |
value | V | X | any | any |
add | V | X | any | JSON aray |
default | V | X | any | any |
essential | X | V | true, false | any |
Table: Combined with content
Scenario 1
Example policy to ensure RPs will be registered to receive ID tokens with the auth_time
claim, by setting the require_auth_time
metadata parameter to true
.
{
"require_auth_time" : {
"value" : true
}
}
Input metadata | Output metadata | |
---|---|---|
A |
|
|
B |
|
|
Definition lists
If you write custom HTML defintion list, make sure to wrap them in a div with the responsive-table
class.
- Encoding
- Self-contained (JWT)
-
- Cryptographically security:
- Signed (JWS)
- Signed (JWS) and encrypted (JWE)
- Profile:
- c2id-1.1
- c2id-1.0
- oauth-1.0 (RFC 9068)
- custom
- Cryptographically security:
- Identifier-based (opaque)
- Subject identifier
- Public
- Pairwise (encrypted)