All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.quarkus.oidc.OidcTenantConfig.jdp Maven / Gradle / Ivy

Go to download

Secure your applications with OpenID Connect Adapter and IDP such as Keycloak

There is a newer version: 3.17.5
Show newest version
#
#Thu May 25 10:16:12 CEST 2023
io.quarkus.oidc.OidcTenantConfig.introspectionPath=Relative path or absolute URL of the OIDC RFC7662 introspection endpoint which can introspect both opaque and JWT tokens.\nThis property must be set if OIDC discovery is disabled and 1) the opaque bearer access tokens have to be verified\nor 2) JWT tokens have to be verified while the cached JWK verification set with no matching JWK is being refreshed.\nThis property will be ignored if the discovery is enabled.
io.quarkus.oidc.OidcTenantConfig.logout=RP Initiated and BackChannel Logout configuration
io.quarkus.oidc.OidcTenantConfig.jwksPath=Relative path or absolute URL of the OIDC JWKS endpoint which returns a JSON Web Key Verification Set.\nThis property should be set if OIDC discovery is disabled and the local JWT verification is required.\nThis property will be ignored if the discovery is enabled.
io.quarkus.oidc.OidcTenantConfig.provider=Well known OpenId Connect provider identifier
io.quarkus.oidc.OidcTenantConfig.tenantId=A unique tenant identifier. It must be set by {@code TenantConfigResolver} providers which\nresolve the tenant configuration dynamically and is optional in all other cases.
io.quarkus.oidc.OidcTenantConfig.WEB_APP=A {@code WEB_APP} is a client that serves pages, usually a frontend application. For this type of client the\nAuthorization Code Flow is defined as the preferred method for authenticating users.
io.quarkus.oidc.OidcTenantConfig.userInfoPath=Relative path or absolute URL of the OIDC userinfo endpoint.\nThis property must only be set for the 'web-app' applications if OIDC discovery is disabled\nand 'authentication.user-info-required' property is enabled.\nThis property will be ignored if the discovery is enabled.
io.quarkus.oidc.OidcTenantConfig.tenantEnabled=If this tenant configuration is enabled.
io.quarkus.oidc.OidcTenantConfig.cacheUserInfoInIdtoken=Allow inlining UserInfo in IdToken instead of caching it in the token cache.\nThis property is only checked when an internal IdToken is generated when Oauth2 providers do not return IdToken.\nInlining UserInfo in the generated IdToken allows to store it in the session cookie and avoids introducing a cached\nstate.
io.quarkus.oidc.OidcTenantConfig.tokenStateManager=Default token state manager configuration
io.quarkus.oidc.OidcTenantConfig.allowTokenIntrospectionCache=Allow caching the token introspection data.\nNote enabling this property does not enable the cache itself but only permits to cache the token introspection\nfor a given tenant. If the default token cache can be used then please see {@link OidcConfig.TokenCache} how to enable\nit.
io.quarkus.oidc.OidcTenantConfig.token=Configuration how to validate the token claims.
io.quarkus.oidc.OidcTenantConfig.authorizationPath=Relative path or absolute URL of the OIDC authorization endpoint which authenticates the users.\nThis property must be set for the 'web-app' applications if OIDC discovery is disabled.\nThis property will be ignored if the discovery is enabled.
io.quarkus.oidc.OidcTenantConfig.SERVICE=A {@code SERVICE} is a client that has a set of protected HTTP resources, usually a backend application following the\nRESTful Architectural Design. For this type of client, the Bearer Authorization method is defined as the preferred\nmethod for authenticating and authorizing users.
io.quarkus.oidc.OidcTenantConfig.applicationType=The application type, which can be one of the following values from enum {@link ApplicationType}.
io.quarkus.oidc.OidcTenantConfig.introspectionCredentials=Introspection Basic Authentication which must be configured only if the introspection is required\nand OpenId Connect Provider does not support the OIDC client authentication configured with\n{@link OidcCommonConfig\#credentials} for its introspection endpoint.
io.quarkus.oidc.OidcTenantConfig.roles=Configuration to find and parse a custom claim containing the roles information.
io.quarkus.oidc.OidcTenantConfig.HYBRID=A combined {@code SERVICE} and {@code WEB_APP} client.\nFor this type of client, the Bearer Authorization method will be used if the Authorization header is set\nand Authorization Code Flow - if not.
io.quarkus.oidc.OidcTenantConfig.endSessionPath=Relative path or absolute URL of the OIDC end_session_endpoint.\nThis property must be set if OIDC discovery is disabled and RP Initiated Logout support for the 'web-app' applications is\nrequired.\nThis property will be ignored if the discovery is enabled.
io.quarkus.oidc.OidcTenantConfig.publicKey=Public key for the local JWT token verification.\nOIDC server connection will not be created when this property is set.
io.quarkus.oidc.OidcTenantConfig.allowUserInfoCache=Allow caching the user info data.\nNote enabling this property does not enable the cache itself but only permits to cache the user info data\nfor a given tenant. If the default token cache can be used then please see {@link OidcConfig.TokenCache} how to enable\nit.




© 2015 - 2025 Weber Informatics LLC | Privacy Policy