The user can now authenticate with the authorization server's authorization endpoint and receive a fake id token. |
||
|---|---|---|
| .. | ||
| authorizations | ||
The user can now authenticate with the authorization server's authorization endpoint and receive a fake id token. |
||
|---|---|---|
| .. | ||
| authorizations | ||