Uploaded image for project: 'Red Hat build of Keycloak'
  1. Red Hat build of Keycloak
  2. RHBK-3594

Keycloak docs state that only TLSv1.3 is used [GHI#43164]

XMLWordPrintable

    • False
    • Hide

      None

      Show
      None
    • False

      Before reporting an issue

      [x] I have read and understood the above terms for submitting issues, and I understand that my issue may be closed without action if I do not follow them.

      Area

      docs

      Describe the bug

      https://www.keycloak.org/server/enabletls#_configuring_tls_protocols states that only TLS 1.3 is used.

      > By default, Keycloak does not enable deprecated TLS protocols. If your client supports only deprecated protocols, consider upgrading the client. However, as a temporary work-around, you can enable deprecated protocols by running the following command:
      ...
      To also allow TLSv1.2, use a command such as the following: kc.sh start --https-protocols=TLSv1.3,TLSv1.2.

      But actually since #21912 both TLS 1.3+1.2 are enabled by default. Due to a bug in Quarkus even before both were enabled.

      Version

      main

      Regression

      [ ] The issue is a regression

      Expected behavior

      The docs should be consistent with the actual defaults.

      Actual behavior

      Outdated docs.

      How to Reproduce?

      Look at the docs.

      Anything else?

      I'll create a PR

              Unassigned Unassigned
              pvlha Pavel Vlha
              Keycloak Cloud Native
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: