fixing RHSSO622 623 624 625 pulled in 613

This commit is contained in:
Chuck Copello 2016-11-29 17:15:51 -05:00
parent 5fddcd91c6
commit a42274f893
3 changed files with 6 additions and 7 deletions

View file

@ -118,6 +118,7 @@ expose-token::
The default value is _false_.
credentials::
Not required for public clients or where the client is "bearer-only."
Specify the credentials of the application. This is an object notation where the key is the credential type and the value is the value of the credential type.
Currently `password` and `jwt` is supported.
This is _REQUIRED_.

View file

@ -27,7 +27,7 @@
===== Node.js (server-side)
* <<fake/../../oidc/nodejs-adapter.adoc#_nodejs_adapter,Node.js>>
===== Apache Cordova
===== JavaScript
* <<fake/../../oidc/javascript-adapter.adoc#_javascript_adapter,JavaScript>>
{% if book.community %}
@ -76,4 +76,4 @@
===== Apache HTTP Server
* https://github.com/UNINETT/mod_auth_mellon[mod_auth_mellon]
* <<fake/../../saml/mod-auth-mellon.adoc#,mod_auth_mellon>>

View file

@ -16,5 +16,3 @@ To be able to secure WAR apps deployed on JBoss EAP, you must install and config
You then provide a keycloak config, `/WEB-INF/keycloak-saml.xml` file in your WAR and change the auth-method to KEYCLOAK-SAML within web.xml.
Both methods are described in this section.