From 141c092ab77927e9c04d60d6f823ac78410e253c Mon Sep 17 00:00:00 2001 From: mposolda Date: Tue, 16 Jun 2020 08:21:03 +0200 Subject: [PATCH] KEYCLOAK-14383 keycloak-documentation tests are failing due the link to ha-proxy --- server_admin/topics/authentication/x509.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/server_admin/topics/authentication/x509.adoc b/server_admin/topics/authentication/x509.adoc index b6cf5709c1..0c8eb1d23a 100644 --- a/server_admin/topics/authentication/x509.adoc +++ b/server_admin/topics/authentication/x509.adoc @@ -256,7 +256,7 @@ You can use this provider when your {project_name} server is behind an HAProxy r In this example configuration, the client certificate will be looked up from the HTTP header, `SSL_CLIENT_CERT`, and the other certificates from its chain will be looked up from HTTP headers like `CERT_CHAIN_0` , `CERT_CHAIN_1`, ..., `CERT_CHAIN_9` . The attribute `certificateChainLength` is the maximum length of the chain, so the last one tried attribute would be `CERT_CHAIN_9` . -Consult the link:http://www.haproxy.org/#docs[HAProxy documentation] for the details of how the HTTP Headers for the client certificate and client certificate chain can be configured and their proper names. +Consult the HAProxy documentation for the details of how the HTTP Headers for the client certificate and client certificate chain can be configured and their proper names. ===== Apache certificate lookup provider