Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

security-openid-connect-quickstart and AWS Cognito #819

Closed
aosama opened this issue Mar 20, 2021 · 2 comments
Closed

security-openid-connect-quickstart and AWS Cognito #819

aosama opened this issue Mar 20, 2021 · 2 comments

Comments

@aosama
Copy link

aosama commented Mar 20, 2021

We have tried the exact same approach in this sample project security-openid-connect-quickstart with AWS Cogniot and could not get it to work based on the guidance in this example and the article.

The REST endpoint implemented in quarkus that is inside the class "UsersResource" having REST path of "/me" will always return 401 if the bearer token exists regardless of what type of annotation it has.

Would recommend to explain in the article how can one debug the reasons behind OIDC giving unauthorized ..... for example is it because BEARER toke expired? or is it because signature verification failure? or any debug log that tells us as developers the reason behind the authorization failure.

Having such logs would help trouble shoot why an endpoint refuse to serve the request based on OIDC.

@sberyozkin
Copy link
Member

@aosama

Sorry for a delay

Can you please add

quarkus.log.category."io.quarkus.oidc.runtime.OidcProvider".min-level=TRACE
quarkus.log.category."io.quarkus.oidc.runtime.OidcProvider".level=TRACE

will also update the docs, thanks

@sberyozkin
Copy link
Member

@aosama Docs have been updated: quarkusio/quarkus#17210

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants