From a42274f89326cb33b24dbabb92b1cd9315c15515 Mon Sep 17 00:00:00 2001 From: Chuck Copello Date: Tue, 29 Nov 2016 17:15:51 -0500 Subject: [PATCH] fixing RHSSO622 623 624 625 pulled in 613 --- topics/oidc/java/java-adapter-config.adoc | 5 +++-- topics/overview/supported-platforms.adoc | 4 ++-- topics/saml/java/jboss-adapter.adoc | 4 +--- 3 files changed, 6 insertions(+), 7 deletions(-) diff --git a/topics/oidc/java/java-adapter-config.adoc b/topics/oidc/java/java-adapter-config.adoc index f9ce2073b2..a71b1b68d9 100644 --- a/topics/oidc/java/java-adapter-config.adoc +++ b/topics/oidc/java/java-adapter-config.adoc @@ -38,7 +38,7 @@ This is what one might look like: ---- You can use `${...}` enclosure for system property replacement. For example `${jboss.server.config.dir}` would be replaced by `/path/to/{{book.project.name}}`. -Replacement of environment variables is also supported via the `env` prefix, e.g. `${env.MY_ENVIRONMENT_VARIABLE}`. +Replacement of environment variables is also supported via the `env` prefix, e.g. `${env.MY_ENVIRONMENT_VARIABLE}`. The initial config file can be obtained from the the admin console. This can be done by opening the admin console, select `Clients` from the menu and clicking on the corresponding client. Once the page for the client is opened click on the `Installation` tab and select `Keycloak OIDC JSON`. @@ -118,6 +118,7 @@ expose-token:: The default value is _false_. credentials:: + Not required for public clients or where the client is "bearer-only." Specify the credentials of the application. This is an object notation where the key is the credential type and the value is the value of the credential type. Currently `password` and `jwt` is supported. This is _REQUIRED_. @@ -148,7 +149,7 @@ truststore:: Client making HTTPS requests need a way to verify the host of the server they are talking to. This is what the trustore does. The keystore contains one or more trusted host certificates or certificate authorities. - You can create this truststore by extracting the public certificate of the {{book.project.name}} server's SSL keystore. + You can create this truststore by extracting the public certificate of the {{book.project.name}} server's SSL keystore. This is _REQUIRED_ unless `ssl-required` is `none` or `disable-trust-manager` is `true`. truststore-password:: diff --git a/topics/overview/supported-platforms.adoc b/topics/overview/supported-platforms.adoc index a0cab39a96..88cc916482 100644 --- a/topics/overview/supported-platforms.adoc +++ b/topics/overview/supported-platforms.adoc @@ -27,7 +27,7 @@ ===== Node.js (server-side) * <> -===== Apache Cordova +===== JavaScript * <> {% if book.community %} @@ -76,4 +76,4 @@ ===== Apache HTTP Server -* https://github.com/UNINETT/mod_auth_mellon[mod_auth_mellon] +* <> diff --git a/topics/saml/java/jboss-adapter.adoc b/topics/saml/java/jboss-adapter.adoc index 9091c41bf6..7ca4f173aa 100644 --- a/topics/saml/java/jboss-adapter.adoc +++ b/topics/saml/java/jboss-adapter.adoc @@ -15,6 +15,4 @@ To be able to secure WAR apps deployed on JBoss EAP, you must install and config {% endif %} You then provide a keycloak config, `/WEB-INF/keycloak-saml.xml` file in your WAR and change the auth-method to KEYCLOAK-SAML within web.xml. -Both methods are described in this section. - - +Both methods are described in this section.