Skip to content

Commit c03c3d4

Browse files
committed
refactor: Clarify SSO documentation and user claims access
- Simplify the explanation of default page protection with SSO enabled. - Emphasize accessing user claims to tailor user experience based on identity.
1 parent 282c6fc commit c03c3d4

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

examples/official-site/safety.sql

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -111,12 +111,10 @@ to your identity provider and your application code never executes.
111111
This keeps attackers outside your SSO realm from reaching your app,
112112
even if a vulnerability exists in your own code.
113113
114-
By default, all pages are protected. You can scope access using the
115-
`oidc_protected_paths` and `oidc_public_paths` settings. See the
116-
[configuration documentation](https://github.com/sqlpage/SQLPage/blob/main/configuration.md#openid-connect-oidc-authentication).
117-
Once authenticated, access user claims with
118-
[`sqlpage.user_info()`](/functions.sql?function=user_info) or inspect the full token with
119-
[`sqlpage.user_info_token()`](/functions.sql?function=user_info_token).
114+
By default, all pages are protected when single sign-on is enabled.
115+
Once authenticated, you can access user claims with
116+
[`sqlpage.user_info()`](/functions.sql?function=user_info)
117+
to further restrict what users see based on who they are.
120118
121119
## Protection against [CSRF attacks](https://en.wikipedia.org/wiki/Cross-site_request_forgery)
122120

0 commit comments

Comments
 (0)