Different clients may have different requirements. To meet this requirement, the authorization server in Airlock IAM offers configuration overrides.
Configuration overrides use the configuration of the authorization server as the base and allow for configuration on a particular client to override the base configuration.
The following table shows which features can profit from configuration overrides and how:
Feature | Authorization server | client |
---|---|---|
Flows and Grants | configuration applies to all clients | - |
Endpoints | configuration applies to all clients | - |
Persistency | configuration applies to all clients | - |
Scopes |
|
|
Claims |
|
|
PKCE |
|
|