KEYCLOAK-8979 Updates to profiles.adoc to reflect unification of features in community and product

This commit is contained in:
stianst 2018-12-04 18:59:38 +01:00 committed by Stian Thorgersen
parent 8b81106dec
commit 4aa5b24b0f

View file

@ -2,42 +2,65 @@
== Profiles == Profiles
ifeval::[{project_community}==true] There are features in {project_name} that are not enabled by default, these include features that are not fully
{project_name} has a single profile, community, that enables most features by default, including features that supported. In addition there are some features that are enabled by default, but that can be disabled.
are considered less mature. It is however possible to disable individual features.
The features that can be enabled and disabled are: The features that can be enabled and disabled are:
[cols="3*", options="header"] [cols="4*", options="header"]
|=== |===
|Name |Name
|Description |Description
|Enabled by default |Enabled by default
|Support level
|authorization |account2
|Authorization Services |New Account Management Console
|Yes |No
|Experimental
|account_api
|Account Management REST API
|No
|Preview
|admin_fine_grained_authz
|Fine-Grained Admin Permissions
|No
|Preview
|authz_drools_policy
|Drools Policy for Authorization Services
|No
|Preview
|docker |docker
|Docker Registry protocol |Docker Registry protocol
|No |No
|Supported
|impersonation |impersonation
|Ability for admins to impersonate users |Ability for admins to impersonate users
|Yes |Yes
|Supported
|openshift_integration
|Extension to enable securing OpenShift
|No
|Preview
|script |script
|Write custom authenticators using JavaScript |Write custom authenticators using JavaScript
|Yes |Yes
|Preview
|token_exchange
|Token Exchange Service
|No
|Preview
|=== |===
endif::[]
ifeval::[{project_product}==true] To enable all preview features start the server with:
{project_name} has two profiles, product and preview. The product profile is enabled by default, which disables
some tech preview features. To enable the features you can either switch to the preview profile or enable individual
features.
To enable the preview profile start the server with:
[source] [source]
---- ----
@ -53,32 +76,6 @@ the file:
profile=preview profile=preview
---- ----
The features that can be enabled and disabled are:
[cols="3*", options="header"]
|===
|Name
|Description
|Enabled by default
|authorization
|Authorization Services
|No
|docker
|Docker Registry protocol
|No
|impersonation
|Ability for admins to impersonate users
|Yes
|script
|Write custom authenticators using JavaScript
|No
|===
endif::[]
To enable a specific feature start the server with: To enable a specific feature start the server with:
[source] [source]
@ -88,6 +85,13 @@ bin/standalone.sh|bat -Dkeycloak.profile.feature.<feature name>=enabled
For example to enable Docker use `-Dkeycloak.profile.feature.docker=enabled`. For example to enable Docker use `-Dkeycloak.profile.feature.docker=enabled`.
You can set this permanently in the `profile.properties` file by adding:
[source]
----
feature.docker=enabled
----
To disable a specific feature start the server with: To disable a specific feature start the server with:
[source] [source]
@ -103,21 +107,3 @@ You can set this permanently in the `profile.properties` file by adding:
---- ----
feature.impersonation=disabled feature.impersonation=disabled
---- ----
ifeval::[{project_product}==true]
To enable a specific feature without enabling the full preview profile you can start the server with:
[source]
----
bin/standalone.sh|bat -Dkeycloak.profile.feature.<feature name>=enabled`
----
For example to enable Authorization Services use `-Dkeycloak.profile.feature.authorization=enabled`.
You can set this permanently in the `profile.properties` file by adding:
[source]
----
feature.authorization=enabled
----
endif::[]