diff --git a/src/pages/verify/getting-started/oidc-intro.mdx b/src/pages/verify/getting-started/oidc-intro.mdx
index 329861e6..1bc825d5 100644
--- a/src/pages/verify/getting-started/oidc-intro.mdx
+++ b/src/pages/verify/getting-started/oidc-intro.mdx
@@ -51,7 +51,7 @@ To authenticate the user, your app must send the user to the _OAuth2 authorizati
You can find the URL for the _OAuth2 authorization endpoint_ in the OpenID Connect Discovery Document exposed on your [Idura Verify Domain](/verify/getting-started/basics/#domains):
-```
+```http
GET https://YOUR_SUBDOMAIN.idura.broker/.well-known/openid-configuration
```
@@ -61,7 +61,7 @@ The response from this endpoint is a JSON document with an `authorization_endpoi
The following initiates the authentication through an OAuth2 authorization request:
-```
+```http
GET https://YOUR_SUBDOMAIN.idura.broker/oauth2/authorize?
response_type=code|id_token&
client_id=CLIENT_ID&
@@ -117,14 +117,12 @@ If you want to receive the response in another way, you must specify the `respon
| `scope` |
- {' '}
For applications configured with a `static` scope strategy, specify `openid`. This gets you
the information configured in the management dashboard for each kind of eID (where
applicable). For applications configured with a `dynamic` scope strategy, you
must specify scope tokens for the types of data you want, in addition to the `openid` scope
- token. Possible values are described in the individual eID articles.
-
- You can read more about this parameter [here](#the-scope-parameter){' '}
+ token. Possible values are described in the individual eID articles.
+ You can read more about this parameter [here](#the-scope-parameter).
|
@@ -283,7 +281,7 @@ PKCE allows you to use one-time secrets to perform code exchange. The format of
### Example request
-```
+```http
GET https://YOUR_SUBDOMAIN.idura.broker/oauth2/authorize?
response_type=code&
response_mode=query&
@@ -324,7 +322,7 @@ Implicit Flow, which returns an `id_token` directly in the browser via the `#` f
### Example request
-```
+```http
GET https://YOUR_SUBDOMAIN.idura.broker/oauth2/authorize?
response_type=id_token&
response_mode=fragment&
@@ -337,7 +335,7 @@ GET https://YOUR_SUBDOMAIN.idura.broker/oauth2/authorize?
### Example response
-```
+```text
HTTP/1.1 302 Found
Location: YOUR_RETURN_URL#id_token=eyJ[...].eyJ[...].Sfl[...]&state=[...]
```
diff --git a/src/pages/verify/guides/custom-styling.mdx b/src/pages/verify/guides/custom-styling.mdx
index 58775ebd..e200dd5e 100644
--- a/src/pages/verify/guides/custom-styling.mdx
+++ b/src/pages/verify/guides/custom-styling.mdx
@@ -69,19 +69,19 @@ If you have not configured a custom style sheet URL, Idura Verify ignores the `c
If you have configured, say,
-```
+```http
https://my.css.host/static/path
```
as a custom style sheet, and you construct an authorize request containing a
-```
+```text
css_path:dynamic/subpath?q=x
```
in the `login_hint` parameter, the resulting CSS URL put in the HTML responses from Idura Verify will change to
-```
+```http
https://my.css.host/dynamic/subpath?q=x
```
diff --git a/src/pages/verify/integrations/javascript.mdx b/src/pages/verify/integrations/javascript.mdx
index 079789cd..cbdebfc9 100644
--- a/src/pages/verify/integrations/javascript.mdx
+++ b/src/pages/verify/integrations/javascript.mdx
@@ -32,7 +32,7 @@ You will need to add this URL to the list of allowed URLs for your application.
If you are developing with plain HTML and running your application locally, your callback URL might look like this:
-```
+```http
http://localhost:3000/example/index.html
```
diff --git a/src/pages/verify/integrations/nodejs-express.mdx b/src/pages/verify/integrations/nodejs-express.mdx
index fbd0e158..0e462f6b 100644
--- a/src/pages/verify/integrations/nodejs-express.mdx
+++ b/src/pages/verify/integrations/nodejs-express.mdx
@@ -34,7 +34,7 @@ You will need to add this URL to the list of allowed URLs for your application.
If you were running locally with an Express login and logout route, your callback URLs might look something like:
-```
+```http
http://localhost:3000/login
http://localhost:3000/logout
```
diff --git a/src/pages/verify/integrations/php.mdx b/src/pages/verify/integrations/php.mdx
index ad474caa..abb7add5 100644
--- a/src/pages/verify/integrations/php.mdx
+++ b/src/pages/verify/integrations/php.mdx
@@ -17,9 +17,9 @@ subtitle: Accept MitID, Swedish BankID, Norwegian BankID and other eID logins wi
### Install
-1. Install library using composer
+1. Install the library using composer:
-```
+```bash
composer require jumbojett/openid-connect-php
```
diff --git a/src/pages/verify/integrations/vuejs.mdx b/src/pages/verify/integrations/vuejs.mdx
index 35cda00e..40d936bf 100644
--- a/src/pages/verify/integrations/vuejs.mdx
+++ b/src/pages/verify/integrations/vuejs.mdx
@@ -30,7 +30,7 @@ You will need to add this URL to the list of allowed URLs for your application.
If you are running your application locally, your callback URL might look like this:
-```
+```http
http://localhost:5173
```