File tree Expand file tree Collapse file tree 1 file changed +4
-6
lines changed Expand file tree Collapse file tree 1 file changed +4
-6
lines changed Original file line number Diff line number Diff line change @@ -111,12 +111,10 @@ to your identity provider and your application code never executes.
111
111
This keeps attackers outside your SSO realm from reaching your app,
112
112
even if a vulnerability exists in your own code.
113
113
114
- By default, all pages are protected. You can scope access using the
115
- `oidc_protected_paths` and `oidc_public_paths` settings. See the
116
- [configuration documentation](https://github.com/sqlpage/SQLPage/blob/main/configuration.md#openid-connect-oidc-authentication).
117
- Once authenticated, access user claims with
118
- [`sqlpage.user_info()`](/functions.sql?function=user_info) or inspect the full token with
119
- [`sqlpage.user_info_token()`](/functions.sql?function=user_info_token).
114
+ By default, all pages are protected when single sign-on is enabled.
115
+ Once authenticated, you can access user claims with
116
+ [`sqlpage.user_info()`](/functions.sql?function=user_info)
117
+ to further restrict what users see based on who they are.
120
118
121
119
## Protection against [CSRF attacks](https://en.wikipedia.org/wiki/Cross-site_request_forgery)
122
120
You can’t perform that action at this time.
0 commit comments