io.quarkus.oidc.OidcTenantConfig$Token.jdp Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of quarkus-oidc Show documentation
Show all versions of quarkus-oidc Show documentation
Secure your applications with OpenID Connect Adapter and IDP such as Keycloak
#
#Wed Feb 17 13:03:14 CET 2021
io.quarkus.oidc.OidcTenantConfig.Token.lifespanGrace=Life span grace period in seconds.\nWhen checking token expiry, current time is allowed to be later than token expiration time by at most the configured\nnumber of seconds.\nWhen checking token issuance, current time is allowed to be sooner than token issue time by at most the configured\nnumber of seconds.
io.quarkus.oidc.OidcTenantConfig.Token.autoRefreshInterval=Token auto-refresh interval in seconds during the user re-authentication.\nIf this option is set then the valid ID token will be refreshed if it will expire in less than a number of minutes\nset by this option. The user will still be authenticated if the ID token can no longer be refreshed but is still\nvalid.\nThis option will be ignored if the 'refresh-expired' property is not enabled.
io.quarkus.oidc.OidcTenantConfig.Token.tokenType=Expected token type
io.quarkus.oidc.OidcTenantConfig.Token.header=Custom HTTP header that contains a bearer token.\nThis option is valid only when the application is of type {@link ApplicationType\#SERVICE}}.
io.quarkus.oidc.OidcTenantConfig.Token.principalClaim=Name of the claim which contains a principal name. By default, the 'upn', 'preferred_username' and `sub` claims are\nchecked.
io.quarkus.oidc.OidcTenantConfig.Token.audience=Expected audience 'aud' claim value which may be a string or an array of strings.
io.quarkus.oidc.OidcTenantConfig.Token.issuer=Expected issuer 'iss' claim value.
io.quarkus.oidc.OidcTenantConfig.Token.forcedJwkRefreshInterval=Forced JWK set refresh interval in minutes.
io.quarkus.oidc.OidcTenantConfig.Token.refreshExpired=Refresh expired ID tokens.\nIf this property is enabled then a refresh token request will be performed if the ID token has expired\nand, if successful, the local session will be updated with the new set of tokens.\nOtherwise, the local session will be invalidated and the user redirected to the OpenID Provider to re-authenticate.\nIn this case the user may not be challenged again if the OIDC provider session is still active.\n\nFor this option be effective the `authentication.session-age-extension` property should also be set to a non-zero\nvalue since the refresh token is currently kept in the user session.\n\nThis option is valid only when the application is of type {@link ApplicationType\#WEB_APP}}.
© 2015 - 2025 Weber Informatics LLC | Privacy Policy