You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _pages/security-events.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ The [OpenID RISC Profile][openid-risc-events-profile] defines some very specific
42
42
43
43
### Auto-discovery
44
44
45
-
Login.gov provides a JSON endpoint for OpenID Connect auto-discovery at `/.well-known/risc-configuration`. In our agency integration environment, this is available at <https://idp.int.identitysandbox.gov/.well-known/risc-configuration>
45
+
Login.gov provides a JSON endpoint for OpenID Connect auto-discovery at `/.well-known/risc-configuration`. In our agency integration environment, this is available at <https://idp.int.identitysandbox.gov/.well-known/risc-configuration>. In production, the URL is <https://secure.login.gov/.well-known/risc-configuration>.
46
46
47
47
### Supported Incoming Events
48
48
@@ -88,7 +88,7 @@ JWTs must be signed by the client application's private key using **RS256**, the
88
88
#### JWT Claims
89
89
90
90
***aud** (required)
91
-
The audience for this JWT, which is the full URL for the `/api/risc/security_events` endpoint. In the agency integration environment, this is `https://idp.int.identitysandbox.gov/api/risc/security_events`
91
+
The audience for this JWT, which is the full URL for the `/api/risc/security_events` endpoint. In the agency integration environment, this is `https://idp.int.identitysandbox.gov/api/risc/security_events`. In production, this is `https://secure.login.gov/api/risc/security_events`.
92
92
93
93
***iat**
94
94
Time at which the JWT was issued, an integer timestamp representing the number of seconds since the Unix Epoch.
@@ -112,7 +112,8 @@ JWTs must be signed by the client application's private key using **RS256**, the
112
112
Must be **iss-sub**, this indicates the **sub** is the subject provided by the original issuer (Login.gov)
113
113
114
114
***iss**
115
-
This is Login.gov's issuer, the root URL for Login.gov. In the agency integration environment, this is `https://idp.int.identitysandbox.gov`
115
+
This is Login.gov's issuer, the root URL for Login.gov. In the agency integration environment, this is `https://idp.int.identitysandbox.gov`. In production, this is `https://secure.login.gov/`.
116
+
116
117
117
118
***sub**
118
119
The UUID identifying the user. This is provided as the `sub` inside the `id_token` JWT in the [OpenID Token endpoint]({{ '/oidc/token/#token-response' | prepend: site.baseurl }}).
@@ -276,21 +277,23 @@ Example:
276
277
277
278
Login.gov will make a POST request to your app's `push_notification_url`, see [Configuration](#configuration) for more details on setting that up. The JWT will be signed with Login.gov's private key. See the OpenID Connect guide for information on how to get Login.gov's public key from the [Certificates Endpoint](/oidc/certificates/).
278
279
279
-
If your app had the client ID of `urn:gov:gsa:openidconnect:test:risc:sets` and was configured to receive events at `https://agency.example.gov/events`, and a user freed up `[email protected]`Login.gov would make a request like this.
280
+
If your app had the client ID of `urn:gov:gsa:openidconnect:test:risc:sets` and was configured to receive events at `https://agency.example.gov/events`, and a user deleted their Login.gov account, Login.gov would make a request like the one below.
Time at which the JWT was issued, an integer timestamp representing the number of seconds since the Unix Epoch.
336
339
337
340
***iss** (string)
338
-
The issuer of this SET, which will be Login.gov's issuer, the root URL for Login.gov. In the agency integration environment, this is `https://idp.int.identitysandbox.gov`
341
+
The issuer of this SET, which will be Login.gov's issuer, the root URL for Login.gov. In the agency integration environment, this is `https://idp.int.identitysandbox.gov`. In production, this is `https://secure.login.gov`.
339
342
340
343
***jti** (required)
341
344
JWT Identifier. This will be a random, unique identifier for this event, you should be able to de-duplicate based on this.
0 commit comments