• Icon: Task Task
    • Resolution: Done
    • Icon: Normal Normal
    • None
    • None
    • Security
    • None
    • 3
    • False
    • Hide

      None

      Show
      None
    • False
    • RHDH Security 3272, RHDH Security 3273, RHDH Security 3274, RHDH Security 3275

      Write and publish a blog on the details of how the different service-to-service auth options work in RHDH and include set-up instructions.

       

      Topics to cover (by rh-ee-abarbaro): 

      • What is service to service to authentication?
      • Most common uses of s2s?
      • What types of s2s RHDH/Backstages offers? (plugin-to-plugin, static token, jwks)
      • How to set up static tokens?
      • How to set up jwk?
      • How to manage permissions/restrictions?
      • Comparison between the two?
      • Security concerns?

              rh-ee-jhe Jessica He
              rh-ee-jhe Jessica He
              Alessandro Barbarossa, Corey Daley (Inactive), Kim Tsao
              RHIDP - Security
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: