From 11fdb06c59e913c31cfc936ae387dc8fde5b60ba Mon Sep 17 00:00:00 2001 From: Bill Burke Date: Fri, 20 May 2016 17:16:45 -0400 Subject: [PATCH] more clients --- topics/clients/oidc/confidential.adoc | 2 +- topics/clients/oidc/service-accounts.adoc | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/topics/clients/oidc/confidential.adoc b/topics/clients/oidc/confidential.adoc index f399573b6b..3220e2edcb 100644 --- a/topics/clients/oidc/confidential.adoc +++ b/topics/clients/oidc/confidential.adoc @@ -2,7 +2,7 @@ ==== Confidential Client Credentials -If you've set the client's <> to `confidential` in the client's +If you've set the client's <> to `confidential` in the client's `Settings` tab, a new `Credentials` tab will show up. As part of dealing with this type of client you have to configure the client's credentials. diff --git a/topics/clients/oidc/service-accounts.adoc b/topics/clients/oidc/service-accounts.adoc index 70eff835ba..18d0b683cf 100755 --- a/topics/clients/oidc/service-accounts.adoc +++ b/topics/clients/oidc/service-accounts.adoc @@ -3,10 +3,10 @@ === Service Accounts Each OIDC client has a built in _service account_ which allows them to obtain an access token. -This is covered in the OAuth 2.0 specifiation under <> -To use this feature you must set the <> of your client to `confidential`. When you do this, +This is covered in the OAuth 2.0 specifiation under <> +To use this feature you must set the <> of your client to `confidential`. When you do this, the `Service Accounts Enabled` switch will appear. You need to turn on this switch. Also make sure that you have -configured your <>. +configured your <>. To use it you must have registered a valid `confidential` Client and you need to check the switch `Service Accounts Enabled` in Keycloak admin console for this client. In tab `Service Account Roles` you can configure the roles available to the service account retrieved on behalf of this client.