-
Notifications
You must be signed in to change notification settings - Fork 24
/
Copy pathopenIdWebSecurity.xml
31 lines (28 loc) · 1.64 KB
/
openIdWebSecurity.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
<server>
<variable name="ServerHost" value="KEYCLOAK_SERVER_URL"/>
<!-- Open ID Connect -->
<!-- Client with inbound propagation set to supported -->
<openidConnectClient authFilterRef="browserAuthFilter" id="odm" scope="openid"
clientId="KEYCLOAK_CLIENT_ID" clientSecret="KEYCLOAK_CLIENT_SECRET"
signatureAlgorithm="RS256" inboundPropagation="supported"
audiences="ALL_AUDIENCES" httpsRequired="false"
tokenReuse="true"
userIdentifier="KEYCLOAK_USERID_CLAIM" groupIdentifier="groups"
issuerIdentifier="${ServerHost}"
jwkEndpointUrl="${ServerHost}/protocol/openid-connect/certs"
authorizationEndpointUrl="${ServerHost}/protocol/openid-connect/auth"
tokenEndpointUrl="${ServerHost}/protocol/openid-connect/token"
validationEndpointUrl="${ServerHost}/protocol/openid-connect/token/introspect"/>
<!-- Client with inbound propagation set to required -->
<openidConnectClient authFilterRef="apiAuthFilter" id="odmapi" scope="openid"
clientId="KEYCLOAK_CLIENT_ID" clientSecret="KEYCLOAK_CLIENT_SECRET"
signatureAlgorithm="RS256" inboundPropagation="required"
audiences="ALL_AUDIENCES" httpsRequired="false"
tokenReuse="true"
userIdentifier="KEYCLOAK_USERID_CLAIM" groupIdentifier="groups"
issuerIdentifier="${ServerHost}"
jwkEndpointUrl="${ServerHost}/protocol/openid-connect/certs"
authorizationEndpointUrl="${ServerHost}/protocol/openid-connect/auth"
tokenEndpointUrl="${ServerHost}/protocol/openid-connect/token"
validationEndpointUrl="${ServerHost}/protocol/openid-connect/token/introspect"/>
</server>