-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make quarkus-oidc properties more generic #4392
Comments
@stianst @pedroigor @stuartwdouglas, @pmlopes I've looked at the code. I'll create a PR either tomorrow or Mon morning sharp and we'll finalize the details |
Azure uses resource for something else that resembles keycloack |
To clarify, vertx uses this config: The important ones are: site (bad name I guess that represents the base url to the idp) clientId, clientSecret. The all endpoints are the path variables. Which can be either a path that is appended to site, or if it's a url it's used autonomously. And then there's a bunch of config for keys when they are loaded offline and tweaks needed for different providers. |
Hi @pmlopes, All, |
I'm thinking of keeping |
But I guess I have to drop the |
Without a discovery endpoint multiple URLs would have to be configured by the user, not just a auth_base_url. A base URL would only work if you know the type of the IdP and what layout it uses for URLs. So I would go for discovery-url, but also allow specifying the URLs within directly if an IdP doesn't support the discovery endpoint. That is a fairly long list though (authorization_endpoint, token_endpoint, userinfo_endpoint, jwks_uri, registration_endpoint). There is also a lot more config that can be retrieved from the discovery endpoint that can be used to correctly configure things. |
Hi Stian, sure, as per the PR discussion we will support the discovery seamlessly, either by having the adapter to recognize the |
Description
Stian:
The text was updated successfully, but these errors were encountered: