more clients

This commit is contained in:
Bill Burke 2016-05-20 17:16:45 -04:00
parent 825b48f2ea
commit 11fdb06c59
2 changed files with 4 additions and 4 deletions

View file

@ -2,7 +2,7 @@
==== Confidential Client Credentials
If you've set the client's <<fake/../client-oidc.adoc#_access-type, _access type_>> to `confidential` in the client's
If you've set the client's <<fake/../../../client-oidc.adoc#_access-type, access type_>> to `confidential` in the client's
`Settings` tab, a new `Credentials` tab will show up. As part of dealing with this
type of client you have to configure the client's credentials.

View file

@ -3,10 +3,10 @@
=== Service Accounts
Each OIDC client has a built in _service account_ which allows them to obtain an access token.
This is covered in the OAuth 2.0 specifiation under <<fake/../../sso-protocols/oidc.adoc#_oidc-auth-flows,Client Credentials Grant>>
To use this feature you must set the <<client-oidc.adoc#_access-type, Access Type>> of your client to `confidential`. When you do this,
This is covered in the OAuth 2.0 specifiation under <<fake/../../../sso-protocols/oidc.adoc#_oidc-auth-flows,Client Credentials Grant>>
To use this feature you must set the <<fake/../../../clients/client-oidc.adoc#_access-type, Access Type>> of your client to `confidential`. When you do this,
the `Service Accounts Enabled` switch will appear. You need to turn on this switch. Also make sure that you have
configured your <<confidential.adoc#_client-credentials, client credentials>>.
configured your <<fake/../../../clients/oidc/confidential.adoc#_client-credentials, client credentials>>.
To use it you must have registered a valid `confidential` Client and you need to check the switch `Service Accounts Enabled` in Keycloak admin console for this client.
In tab `Service Account Roles` you can configure the roles available to the service account retrieved on behalf of this client.