parent
ef134390c2
commit
0f082dde5b
3 changed files with 3 additions and 3 deletions
|
@ -7,7 +7,7 @@
|
|||
title="Relational database setup"
|
||||
summary="Understand how to configure different relational databases for Keycloak"
|
||||
priority=10
|
||||
includedOptions="db db.* hostname">
|
||||
includedOptions="db db-* hostname">
|
||||
|
||||
First step is to decide which database vendor you are going to use. Keycloak has support for a number of different vendors.
|
||||
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
<@tmpl.guide
|
||||
title="Configure TLS"
|
||||
summary="Learn how to configure Keycloak's https certificates for in- and outgoing requests as well as mTLS."
|
||||
includedOptions="https.* http.enabled">
|
||||
includedOptions="https-* http-enabled">
|
||||
|
||||
Transport Layer Security (short: TLS) is crucial to exchange data over a secured channel. For production environments, you should never expose Keycloak endpoints through HTTP, as sensitive data is at the core of what Keycloak exchanges with other applications. In this guide you will learn how to configure Keycloak to use HTTPS/TLS.
|
||||
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
title="Configuring a reverse proxy"
|
||||
summary="Learn how to configure Keycloak together with a reverse proxy, api gateway or load balancer."
|
||||
priority=20
|
||||
includedOptions="proxy proxy.*">
|
||||
includedOptions="proxy proxy-*">
|
||||
|
||||
It is pretty common nowadays to use a reverse proxy in distributed environments. If you want to use Keycloak together with such a proxy, you can use different proxy modes depending on the TLS termination in your specific environment:
|
||||
|
||||
|
|
Loading…
Reference in a new issue