Skip to content

Commit f91fc34

Browse files
committed
Use oidc_additional_trusted_audiences in sso example
Add OIDC config comments and improve array syntax
1 parent 1888c78 commit f91fc34

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed
Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
1-
oidc_issuer_url: http://localhost:8181/realms/sqlpage_demo
2-
oidc_client_id: sqlpage
1+
oidc_issuer_url: http://localhost:8181/realms/sqlpage_demo # Given by keycloak as the "OpenID Endpoint Configuration" url.
2+
oidc_client_id: sqlpage # configured in keycloak (http://localhost:8181/admin/master/console/#/sqlpage_demo/clients/a2bec2b8-f850-405e-9f26-59063ffa6f08/settings)
33
oidc_client_secret: qiawfnYrYzsmoaOZT28rRjPPRamfvrYr # For a safer setup, use environment variables to store this
4-
oidc_protected_paths:
5-
- /protected # Makes the website root is publicly accessible, requiring authentication only for the /protected path
6-
oidc_public_paths:
7-
- /protected/public # Adds an exception for the /protected/public path, which is publicly accessible too
4+
oidc_protected_paths: ["/protected"] # Makes the website root is publicly accessible, requiring authentication only for the /protected path
5+
oidc_public_paths: ["/protected/public"] # Adds an exception for the /protected/public path, which is publicly accessible too
6+
oidc_additional_trusted_audiences: [] # For increased security, reject any token that has more than just the client ID in the "aud" claim

0 commit comments

Comments
 (0)