-
Task
-
Resolution: Done
-
Normal
-
None
-
None
-
None
-
3
-
False
-
-
False
-
-
-
RHDH Security 3272, RHDH Security 3273, RHDH Security 3274, RHDH Security 3275
Write and publish a blog on the details of how the different service-to-service auth options work in RHDH and include set-up instructions.
Topics to cover (by rh-ee-abarbaro):
- What is service to service to authentication?
- Most common uses of s2s?
- What types of s2s RHDH/Backstages offers? (plugin-to-plugin, static token, jwks)
- How to set up static tokens?
- How to set up jwk?
- How to manage permissions/restrictions?
- Comparison between the two?
- Security concerns?