@@ -185,8 +185,6 @@ def __init__(
185185 storage : TokenStorage ,
186186 idp_token_endpoint : str ,
187187 token_exchange_params : TokenExchangeParameters ,
188- redirect_handler : Callable [[str ], Awaitable [None ]] | None = None ,
189- callback_handler : Callable [[], Awaitable [tuple [str , str | None ]]] | None = None ,
190188 timeout : float = 300.0 ,
191189 ) -> None :
192190 """Initialize Enterprise Auth OAuth Client.
@@ -197,16 +195,12 @@ def __init__(
197195 storage: Token storage implementation
198196 idp_token_endpoint: Enterprise IdP token endpoint URL
199197 token_exchange_params: Token exchange parameters
200- redirect_handler: Optional redirect handler
201- callback_handler: Optional callback handler
202198 timeout: Request timeout in seconds
203199 """
204200 super ().__init__ (
205201 server_url = server_url ,
206202 client_metadata = client_metadata ,
207203 storage = storage ,
208- redirect_handler = redirect_handler ,
209- callback_handler = callback_handler ,
210204 timeout = timeout ,
211205 )
212206 self .idp_token_endpoint = idp_token_endpoint
@@ -384,7 +378,7 @@ def decode_id_jag(id_jag: str) -> IDJAGClaims:
384378 Decoded ID-JAG claims
385379
386380 Note:
387- For verification, use server-side validation instead .
381+ This function does not verify the JWT, instead relying on the receiving server to validate it .
388382 """
389383 # Decode without verification for inspection
390384 claims = jwt .decode (id_jag , options = {"verify_signature" : False })
0 commit comments