Skip to content

Commit

Permalink
Minor content updates
Browse files Browse the repository at this point in the history
  • Loading branch information
brionmario committed Jan 18, 2021
1 parent 1d4d1c5 commit 085ec26
Show file tree
Hide file tree
Showing 6 changed files with 34 additions and 37 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
import { TestableComponentInterface } from "@wso2is/core/models";
import { Heading } from "@wso2is/react-components";
import React, { FunctionComponent, ReactElement } from "react";
import { Divider, Message } from "semantic-ui-react";
import { Divider } from "semantic-ui-react";

/**
* Prop types of the component.
Expand Down Expand Up @@ -48,20 +48,18 @@ const AndroidApplicationCreateWizardHelp: FunctionComponent<AndroidApplicationCr

<Divider />

<>
<Heading as="h5">Allowed redirect URLs</Heading>
<React.Fragment>
<Heading as="h5">Allowed Redirect URIs</Heading>
<p>
After user sign-in/sign-out, the user is redirected to a page within your application.
Add the list of possible redirect URLs here. You can specify multiple valid URLs.
Make sure to specify the protocol (https://) otherwise the redirect may fail in some cases.
After user login/logout, the user is redirected to a web page within your application
that receives the post-authentication authorization code.
</p>
<p>E.g. https://sample.app/login</p>

<p>
You can also configure this field later under the <strong>Protocol </strong>
tab in application-edit view.
Specify the list of possible redirect URIs here, so that WSO2 Identity Server
will check if it’s a valid URI before sending the authorization code.
</p>
</>
<p>E.g., https://myapp.io/login</p>
</React.Fragment>
</div>
);
};
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"id": "custom-application",
"name": "Custom Application",
"description": "Manually configure an application without any predefined templates.",
"description": "Applications that uses manual configurations.",
"image": "customApp",
"authenticationProtocol": "",
"category": "DEFAULT",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
import { TestableComponentInterface } from "@wso2is/core/models";
import { Heading } from "@wso2is/react-components";
import React, { FunctionComponent, ReactElement } from "react";
import { Divider, Message } from "semantic-ui-react";
import { Divider } from "semantic-ui-react";

/**
* Prop types of the component.
Expand Down Expand Up @@ -58,20 +58,18 @@ const OIDCWebApplicationCreateWizardHelp: FunctionComponent<OIDCWebApplicationCr

<Divider />

<>
<Heading as="h5">Allowed redirect URLs</Heading>
<React.Fragment>
<Heading as="h5">Allowed Redirect URIs</Heading>
<p>
After user sign-in/sign-out, the user is redirected to a page within your application.
Add the list of possible redirect URLs here. You can specify multiple valid URLs.
Make sure to specify the protocol (https://) otherwise the redirect may fail in some cases.
After user login/logout, the user is redirected to a web page within your application
that receives the post-authentication authorization code.
</p>
<p>E.g. https://sample.app/login</p>

<p>
You can also configure this field later under the <strong>Protocol </strong>
tab in application-edit view.
Specify the list of possible redirect URIs here, so that WSO2 Identity Server
will check if it’s a valid URI before sending the authorization code.
</p>
</>
<p>E.g., https://myapp.io/login</p>
</React.Fragment>
</div>
);
};
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,10 @@ const SinglePageApplicationCreateWizardHelp: FunctionComponent<SinglePageApplica
After user login/logout, the user is redirected to a web page within your application
that receives the post-authentication authorization code.
</p>
<p>Add the list of possible redirect URIs here. You can specify multiple valid URIs.</p>
<p>
Specify the list of possible redirect URIs here, so that WSO2 Identity Server
will check if it’s a valid URI before sending the authorization code.
</p>
<p>E.g., https://myapp.io/login</p>
</React.Fragment>

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
import { TestableComponentInterface } from "@wso2is/core/models";
import { Heading } from "@wso2is/react-components";
import React, { FunctionComponent, ReactElement } from "react";
import { Divider, Message } from "semantic-ui-react";
import { Divider } from "semantic-ui-react";

/**
* Prop types of the component.
Expand Down Expand Up @@ -50,20 +50,18 @@ const WindowsDesktopApplicationCreateWizardHelp: FunctionComponent<

<Divider />

<>
<Heading as="h5">Allowed redirect URLs</Heading>
<React.Fragment>
<Heading as="h5">Allowed Redirect URIs</Heading>
<p>
After user sign-in/sign-out, the user is redirected to a page within your application.
Add the list of possible redirect URLs here. You can specify multiple valid URLs.
Make sure to specify the protocol (https://) otherwise the redirect may fail in some cases.
After user login/logout, the user is redirected to a web page within your application
that receives the post-authentication authorization code.
</p>
<p>E.g. https://sample.app/login</p>

<p>
You can also configure this field later under the <strong>Protocol </strong>
tab in application-edit view.
Specify the list of possible redirect URIs here, so that WSO2 Identity Server
will check if it’s a valid URI before sending the authorization code.
</p>
</>
<p>E.g., https://myapp.io/login</p>
</React.Fragment>
</div>
);
};
Expand Down
4 changes: 2 additions & 2 deletions modules/i18n/src/translations/en-US/portals/console.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1066,8 +1066,8 @@ export const console: ConsoleNS = {
validations: {
empty: "Please add a valid URI.",
required: "This field is required for a functional app. " +
"However, if you are planning to integrate a sample, " +
"this field can be skipped."
"However, if you are planning to try with a sample, " +
"this field can be ignored."
}
},
clientID: {
Expand Down

0 comments on commit 085ec26

Please sign in to comment.