v1.4.0
·
2991 commits
to master
since this release
This version brings us one step closer to resolving issue #3344. We are actively working on a backward-compatible solution for authorization.
Below are some articles that demonstrate how to use Logto as an OAuth or OIDC Identity Provider:
- Streamline OAuth and OIDC Authentication with Logto
- Implement ChatGPT plugins user authentication with Logto
- Simplify Outline authentication with Logto
Feature updates
Introducing the "Always issue Refresh Token" configuration for web apps
![The "Always issue Refresh Token" toggle](https://private-user-images.githubusercontent.com/14722250/241374136-49ec3927-9cdf-4ffe-ab49-5104dd74fac7.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.vFnauHO7Fhre1FcUGcZ7JmQS_IW74ZpjWtIcZRs_PK8)
Turning on this toggle ensures that Refresh Tokens are always issued, regardless of whether prompt=consent
was included in the authorization request or if offline_access
was specified in the scope.
Patch updates
- Improved compatibility by parsing requests with
application/json
content-type for/oidc
APIs. - Automated synchronization of trusted social email and phone information for newly registered users, irrespective of the sign-up identifier configuration.
- For example: Previously, if the "email" was not set as a sign-up identifier (meaning a valid email connector had to be configured and enabled) and Google sign-in was added, the emails from new users would not be synchronized.
- Starting from v1.4.0, this requirement has been removed, as "social sign-in only" scenarios are not uncommon in real-world cases.