-
Enhancement
-
Resolution: Won't Do
-
Minor
-
None
-
None
-
None
-
False
-
None
-
False
-
---
-
---
Today, KOGITO-6970 OAuth2 support can be configured via application properties:
quarkus.oidc-client.petstore_auth.auth-server-url=${keycloak.url}
quarkus.oidc-client.petstore_auth.discovery-enabled=false
quarkus.oidc-client.petstore_auth.token-path=/tokens
quarkus.oidc-client.petstore_auth.credentials.secret=secret
quarkus.oidc-client.petstore_auth.grant.type=password
quarkus.oidc-client.petstore_auth.grant-options.password.username=alice
quarkus.oidc-client.petstore_auth.grant-options.password.password=alice
quarkus.oidc-client.petstore_auth.client-id=petstore-app
Alternatively, users could programmatically create their own OidcClientConfig:
@Path("/clients") public class OidcClientResource { @Inject OidcClients clients; @GET public String getResponse() { OidcClientConfig cfg = new OidcClientConfig(); cfg.setId("myclient"); cfg.setAuthServerUrl("http://localhost:8081/auth/realms/quarkus/"); cfg.setClientId("quarkus"); cfg.getCredentials().setSecret("secret"); Uni<OidcClient> client = clients.newClient(cfg); // use this client to get the token } }
The extension should also support this method of defining the configuration. See: https://quarkus.io/guides/security-openid-connect-client#use-oidcclients
- is incorporated by
-
SRVLOGIC-2 [core] OAuth2 authorization flow in workflows
- Closed
- is related to
-
KOGITO-7057 [KSW][OpenAPI] - Add Token Propagation support to OpenAPI Extension
- Resolved
- relates to
-
KOGITO-6970 Add support for OAuth2 on Quarkus OpenAPI Extension
- Resolved