removed upgrading EAP adapters content from Securing Apps Guide for addition to Upgrade Guide
This commit is contained in:
parent
afe8777bbb
commit
70b815cee5
1 changed files with 4 additions and 17 deletions
|
@ -105,26 +105,13 @@ Alternatively, if the server is running execute:
|
||||||
$ ./bin/jboss-cli.sh --file=adapter-install.cli
|
$ ./bin/jboss-cli.sh --file=adapter-install.cli
|
||||||
----
|
----
|
||||||
|
|
||||||
[[_jboss_adapter_upgrading]]
|
|
||||||
===== Upgrading the adapter
|
|
||||||
|
|
||||||
It is important that you upgrade the ${book.project.name}} server first then the adapters. This is because older adapters
|
|
||||||
will work with the newer server, but not always the other way around.
|
|
||||||
|
|
||||||
The steps to upgrade the adapter is slightly different to the steps to install the adapter.
|
|
||||||
|
|
||||||
First step is to delete the old adapter modules. Do this be deleting the directory `modules/system/add-ons/keycloak/`.
|
|
||||||
|
|
||||||
Next follow the steps in the <<_jboss_adapter_installation,Installing the adapter>> to unzip the adapter. Since the
|
|
||||||
adapter subsystem has already been configured skip that step.
|
|
||||||
|
|
||||||
===== Required Per WAR Configuration
|
===== Required Per WAR Configuration
|
||||||
|
|
||||||
This section describes how to secure a WAR directly by adding config and editing files within your WAR package.
|
This section describes how to secure a WAR directly by adding configuration and editing files within your WAR package.
|
||||||
|
|
||||||
The first thing you must do is create a `keycloak.json` adapter config file within the `WEB-INF` directory of your WAR.
|
The first thing you must do is create a `keycloak.json` adapter configuration file within the `WEB-INF` directory of your WAR.
|
||||||
|
|
||||||
The format of this config file is describe in the <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>> section.
|
The format of this configuration file is described in the <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>> section.
|
||||||
|
|
||||||
Next you must set the `auth-method` to `KEYCLOAK` in `web.xml`.
|
Next you must set the `auth-method` to `KEYCLOAK` in `web.xml`.
|
||||||
You also have to use standard servlet security to specify role-base constraints on your URLs.
|
You also have to use standard servlet security to specify role-base constraints on your URLs.
|
||||||
|
@ -244,7 +231,7 @@ If you have multiple deployments secured by the same realm you can share the rea
|
||||||
|
|
||||||
===== Security Domain
|
===== Security Domain
|
||||||
|
|
||||||
To propogate the security context to the EJB tier you need to configure it to use the "keycloak" security domain. This
|
To propagate the security context to the EJB tier you need to configure it to use the "keycloak" security domain. This
|
||||||
can be achieved with the @SecurityDomain annotation:
|
can be achieved with the @SecurityDomain annotation:
|
||||||
|
|
||||||
[source]
|
[source]
|
||||||
|
|
Loading…
Reference in a new issue