mirror of
https://github.com/matrix-org/matrix-spec
synced 2026-02-03 13:03:41 +01:00
s/identity service/identity server
This commit is contained in:
parent
21f8898cd8
commit
79974b152c
|
|
@ -17,7 +17,7 @@ properties:
|
|||
type: string
|
||||
description: |
|
||||
The session ID. Session IDs are opaque strings generated by the identity
|
||||
service. They must consist entirely of the characters
|
||||
server. They must consist entirely of the characters
|
||||
``[0-9a-zA-Z.=_-]``. Their length must not exceed 255 characters and they
|
||||
must not be empty.
|
||||
example: "123abc"
|
||||
|
|
|
|||
|
|
@ -81,10 +81,10 @@ paths:
|
|||
associate the email address with any Matrix user ID. Specifically,
|
||||
calls to ``/lookup`` will not show a binding.
|
||||
|
||||
The identity service is free to match the token case-insensitively, or
|
||||
The identity server is free to match the token case-insensitively, or
|
||||
carry out other mapping operations such as unicode
|
||||
normalisation. Whether to do so is an implementation detail for the
|
||||
identity service. Clients must always pass on the token without
|
||||
identity server. Clients must always pass on the token without
|
||||
modification.
|
||||
|
||||
Note: for backwards compatibility with previous drafts of this
|
||||
|
|
|
|||
|
|
@ -83,10 +83,10 @@ paths:
|
|||
associate the phone number address with any Matrix user
|
||||
ID. Specifically, calls to ``/lookup`` will not show a binding.
|
||||
|
||||
The identity service is free to match the token case-insensitively, or
|
||||
The identity server is free to match the token case-insensitively, or
|
||||
carry out other mapping operations such as unicode
|
||||
normalisation. Whether to do so is an implementation detail for the
|
||||
identity service. Clients must always pass on the token without
|
||||
identity server. Clients must always pass on the token without
|
||||
modification.
|
||||
|
||||
Note: for backwards compatibility with previous drafts of this
|
||||
|
|
|
|||
|
|
@ -218,7 +218,7 @@ attempts to perform these actions after the expiry will be rejected, and a new
|
|||
session should be created and used instead.
|
||||
|
||||
To start a session, the client makes a request to the appropriate
|
||||
``/requestToken`` endpoint. The identity service then sends a validation token
|
||||
``/requestToken`` endpoint. The identity server then sends a validation token
|
||||
to the user, and the user provides the token to the client. The client then
|
||||
provides the token to the appropriate ``/submitToken`` endpoint, completing the
|
||||
session. At this point, the client should ``/bind`` the third party identifier
|
||||
|
|
@ -227,12 +227,12 @@ or leave it for another entity to bind.
|
|||
Format of a validation token
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
The format of the validation token is left up to the identity service: it
|
||||
The format of the validation token is left up to the identity server: it
|
||||
should choose one appropriate to the 3PID type. (For example, it would be
|
||||
inappropriate to expect a user to copy a long passphrase including punctuation
|
||||
from an SMS message into a client.)
|
||||
|
||||
Whatever format the identity service uses, the validation token must consist of
|
||||
Whatever format the identity server uses, the validation token must consist of
|
||||
at most 255 Unicode codepoints. Clients must pass the token through without
|
||||
modification.
|
||||
|
||||
|
|
|
|||
Loading…
Reference in a new issue