io.quarkus.oidc.OidcTenantConfig$Authentication.jdp Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of quarkus-oidc Show documentation
Show all versions of quarkus-oidc Show documentation
Secure your applications with OpenID Connect Adapter and IDP such as Keycloak
#
#Wed Feb 17 13:03:14 CET 2021
io.quarkus.oidc.OidcTenantConfig.Authentication.restorePathAfterRedirect=If this property is set to 'true' then the original request URI which was used before\nthe authentication will be restored after the user has been redirected back to the application.
io.quarkus.oidc.OidcTenantConfig.Authentication.javaScriptAutoRedirect=If this property is set to 'true' then a normal 302 redirect response will be returned\nif the request was initiated via JavaScript API such as XMLHttpRequest or Fetch and the current user needs to be\n(re)authenticated which may not be desirable for Single Page Applications since\nit automatically following the redirect may not work given that OIDC authorization endpoints typically do not support\nCORS.\nIf this property is set to `false` then a status code of '499' will be returned to allow\nthe client to handle the redirect manually
io.quarkus.oidc.OidcTenantConfig.Authentication.verifyAccessToken=Both ID and access tokens are fetched from the OIDC provider as part of the authorization code flow.\nID token is always verified on every user request as the primary token which is used\nto represent the principal and extract the roles.\nAccess token is not verified by default since it is meant to be propagated to the downstream services.\nThe verification of the access token should be enabled if it is injected as a JWT token.\n\nAccess tokens obtained as part of the code flow will always be verified if `quarkus.oidc.roles.source`\nproperty is set to `accesstoken` which means the authorization decision will be based on the roles extracted from the\naccess token.\n\nBearer access tokens are always verified.
io.quarkus.oidc.OidcTenantConfig.Authentication.sessionAgeExtension=Session age extension in minutes.\nThe user session age property is set to the value of the ID token life-span by default and\nthe user will be redirected to the OIDC provider to re-authenticate once the session has expired.\nIf this property is set to a non-zero value then the expired ID token can be refreshed before\nthe session has expired.\nThis property will be ignored if the `token.refresh-expired` property has not been enabled.
io.quarkus.oidc.OidcTenantConfig.Authentication.cookieForceSecure=If enabled the state, session and post logout cookies will have their 'secure' parameter set to 'true'\nwhen HTTP is used. It may be necessary when running behind an SSL terminating reverse proxy.\nThe cookies will always be secure if HTTPS is used even if this property is set to false.
io.quarkus.oidc.OidcTenantConfig.Authentication.redirectPath=Relative path for calculating a "redirect_uri" query parameter.\nIt has to start from a forward slash and will be appended to the request URI's host and port.\nFor example, if the current request URI is 'https\://localhost\:8080/service' then a 'redirect_uri' parameter\nwill be set to 'https\://localhost\:8080/' if this property is set to '/' and be the same as the request URI\nif this property has not been configured.\nNote the original request URI will be restored after the user has authenticated.
io.quarkus.oidc.OidcTenantConfig.Authentication.cookiePathHeader=Cookie path header parameter value which, if set, identifies the incoming HTTP header\nwhose value will be used to set a path parameter for the session, state and post logout cookies.\nIf the header is missing then the `cookie-path` property will be checked.
io.quarkus.oidc.OidcTenantConfig.Authentication.scopes=List of scopes
io.quarkus.oidc.OidcTenantConfig.Authentication.cookieDomain=Cookie domain parameter value which, if set, will be used for the session, state and post logout cookies.
io.quarkus.oidc.OidcTenantConfig.Authentication.cookiePath=Cookie path parameter value which, if set, will be used to set a path parameter for the session, state and post\nlogout cookies.\nThe `cookie-path-header` property, if set, will be checked first.
io.quarkus.oidc.OidcTenantConfig.Authentication.userInfoRequired=If this property is set to 'true' then an OIDC UserInfo endpoint will be called
io.quarkus.oidc.OidcTenantConfig.Authentication.forceRedirectHttpsScheme=Force 'https' as the 'redirect_uri' parameter scheme when running behind an SSL terminating reverse proxy.\nThis property, if enabled, will also affect the logout `post_logout_redirect_uri` and the local redirect requests.
io.quarkus.oidc.OidcTenantConfig.Authentication.extraParams=Additional properties which will be added as the query parameters to the authentication redirect URI.
io.quarkus.oidc.OidcTenantConfig.Authentication.removeRedirectParameters=Remove the query parameters such as 'code' and 'state' set by the OIDC server on the redirect URI\nafter the user has authenticated by redirecting a user to the same URI but without the query parameters.
© 2015 - 2025 Weber Informatics LLC | Privacy Policy