- 
    
Enhancement
 - 
    Resolution: Won't Do
 - 
    
Minor
 - 
    None
 - 
    None
 - 
    None
 
- 
        False
 - 
        
 - 
        False
 - 
        ---
 - 
        ---
 
Today, KOGITO-6970 OAuth2 support can be configured via application properties:
quarkus.oidc-client.petstore_auth.auth-server-url=${keycloak.url}
quarkus.oidc-client.petstore_auth.discovery-enabled=false
quarkus.oidc-client.petstore_auth.token-path=/tokens
quarkus.oidc-client.petstore_auth.credentials.secret=secret
quarkus.oidc-client.petstore_auth.grant.type=password
quarkus.oidc-client.petstore_auth.grant-options.password.username=alice
quarkus.oidc-client.petstore_auth.grant-options.password.password=alice
quarkus.oidc-client.petstore_auth.client-id=petstore-app
Alternatively, users could programmatically create their own OidcClientConfig:
@Path("/clients") public class OidcClientResource { @Inject OidcClients clients; @GET public String getResponse() { OidcClientConfig cfg = new OidcClientConfig(); cfg.setId("myclient"); cfg.setAuthServerUrl("http://localhost:8081/auth/realms/quarkus/"); cfg.setClientId("quarkus"); cfg.getCredentials().setSecret("secret"); Uni<OidcClient> client = clients.newClient(cfg); // use this client to get the token } }
The extension should also support this method of defining the configuration. See: https://quarkus.io/guides/security-openid-connect-client#use-oidcclients
- is incorporated by
 - 
                    
SRVLOGIC-2 [core] OAuth2 authorization flow in workflows
-         
 - Closed
 
 -         
 
- is related to
 - 
                    
KOGITO-7057 [KSW][OpenAPI] - Add Token Propagation support to OpenAPI Extension
-         
 - Resolved
 
 -         
 
- relates to
 - 
                    
KOGITO-6970 Add support for OAuth2 on Quarkus OpenAPI Extension
-         
 - Resolved
 
 -