- 
    
Enhancement
 - 
    Resolution: Unresolved
 - 
    
Minor
 - 
    None
 - 
    None
 - 
    None
 
- 
        False
 - 
        
 - 
        False
 - 
        ---
 - 
        ---
 
KOGITO-6970 introduced OAuth2 support that can be configured like:
quarkus.oidc-client.petstore_auth.auth-server-url=${keycloak.url}
quarkus.oidc-client.petstore_auth.discovery-enabled=false
quarkus.oidc-client.petstore_auth.token-path=/tokens
quarkus.oidc-client.petstore_auth.credentials.secret=secret
quarkus.oidc-client.petstore_auth.grant.type=password
quarkus.oidc-client.petstore_auth.grant-options.password.username=alice
quarkus.oidc-client.petstore_auth.grant-options.password.password=alice
quarkus.oidc-client.petstore_auth.client-id=petstore-app
The problem is that some of this information is already presented in the Security Scheme structure, for example:
{
   "securitySchemes":{
      "petstore_auth":{
         "type":"oauth2",
         "flows":{
            "implicit":{
               "authorizationUrl":"https://petstore3.swagger.io/oauth/authorize",
               "scopes":{
                  "write:pets":"modify pets in your account",
                  "read:pets":"read your pets"
               }
            }
         }
      }
   }
}
authorizationUrl and scopes could be injected into the OidcClient used by the Authorization filter if no configuration is presented. Otherwise, the configuration properties must override them.
- is incorporated by
 - 
                    
SRVLOGIC-2 [core] OAuth2 authorization flow in workflows
-         
 - Closed
 
 -         
 
- relates to
 - 
                    
KOGITO-6970 Add support for OAuth2 on Quarkus OpenAPI Extension
-         
 - Resolved
 
 -