Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: heading levels in some blog posts #1513

Merged
merged 1 commit into from
Aug 23, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 8 additions & 8 deletions docs/identities/sign-in/actions.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,12 +9,12 @@ import Tabs from "@theme/Tabs"
import TabItem from "@theme/TabItem"
```

# Customize login and registration behavior
## Customize login and registration behavior

You can customize login and registration flows using Ory Actions. This includes calling external services or logic with webhooks
and triggering logic that is built-in to Ory, such requiring a verified email address to sign in.

## Trigger external logic with webhooks
### Trigger external logic with webhooks

Make webhook calls to third-party service providers when users sign up or sign in:

Expand All @@ -23,7 +23,7 @@ Make webhook calls to third-party service providers when users sign up or sign i
- [Hubspot](../../actions/integrations/segment.mdx)
- Other [webhook targets](../../guides/integrate-with-ory-cloud-through-webhooks.mdx)

### Control who registers with additional validation
#### Control who registers with additional validation

Use Ory Actions to add extra validation that allows you to control exactly who can sign up. For example, you can prevent users
from signing up when:
Expand All @@ -39,7 +39,7 @@ Read the
[Flow-interrupting webhooks documentation](../../guides/integrate-with-ory-cloud-through-webhooks.mdx#flow-interrupting-webhooks)
to learn more.

## Revoke previously issued sessions at login
### Revoke previously issued sessions at login

You can revoke all of the user's active session when they log in to your system. This allows the users to have only one active
session, and ensures that they access your services from one point of entry (a device, a browser) at a time.
Expand All @@ -62,7 +62,7 @@ ory patch identity-config {project_id} \
--add '/selfservice/flows/login/after/webauthn/hooks=[{"hook": "revoke_active_sessions"}]'
```

### Disable session revocation
#### Disable session revocation

Follow these steps to disable session revocation on login:

Expand Down Expand Up @@ -104,7 +104,7 @@ Follow these steps to disable session revocation on login:
--remove '/selfservice/flows/login/after/hooks/1'
```

## Allow login only with verified email
### Allow login only with verified email

To allow only the users with a verified email to sign in, follow these steps:

Expand All @@ -118,12 +118,12 @@ banner and limit functionality for unverified accounts. This approach helps impr

:::

### First sign in without verification
#### First sign in without verification

If sessions are issued after registration, users will be signed in after registration, but will need to verify their email address
before they can sign in using other devices or browsers and get more active sessions as a result.

## Log in users after registration
### Log in users after registration

When you enable this behavior, users get a session after they sign up. This means that they don't have to sign in with their newly
created account to get access to your services, but instead can access all the features immediately.
Expand Down
2 changes: 1 addition & 1 deletion docs/oauth2-oidc/userinfo-oidc.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ In this example, we create a new instance of the Ory SDK with the `basePath` set
define an async function that calls the userinfo function with the `accessToken` passed as a parameter. The `data` contains the
user attributes returned by the userinfo endpoint.

# Adding custom claims to the userinfo response
## Adding custom claims to the userinfo response

Any information included in `session.id_token` when accepting the consent request will also be included in the response.

Expand Down
Loading