File tree Expand file tree Collapse file tree 1 file changed +5
-6
lines changed
examples/single sign on/sqlpage Expand file tree Collapse file tree 1 file changed +5
-6
lines changed Original file line number Diff line number Diff line change 1- oidc_issuer_url : http://localhost:8181/realms/sqlpage_demo
2- oidc_client_id : sqlpage
1+ oidc_issuer_url : http://localhost:8181/realms/sqlpage_demo # Given by keycloak as the "OpenID Endpoint Configuration" url.
2+ oidc_client_id : sqlpage # configured in keycloak (http://localhost:8181/admin/master/console/#/sqlpage_demo/clients/a2bec2b8-f850-405e-9f26-59063ffa6f08/settings)
33oidc_client_secret : qiawfnYrYzsmoaOZT28rRjPPRamfvrYr # For a safer setup, use environment variables to store this
4- oidc_protected_paths :
5- - /protected # Makes the website root is publicly accessible, requiring authentication only for the /protected path
6- oidc_public_paths :
7- - /protected/public # Adds an exception for the /protected/public path, which is publicly accessible too
4+ oidc_protected_paths : ["/protected"] # Makes the website root is publicly accessible, requiring authentication only for the /protected path
5+ oidc_public_paths : ["/protected/public"] # Adds an exception for the /protected/public path, which is publicly accessible too
6+ oidc_additional_trusted_audiences : [] # For increased security, reject any token that has more than just the client ID in the "aud" claim
You can’t perform that action at this time.
0 commit comments