Fix {server-root-usualy-auth} to auth
This commit is contained in:
parent
dc27f55399
commit
a4e93d5034
1 changed files with 1 additions and 1 deletions
|
@ -12,7 +12,7 @@ To use it you must have registered a valid `confidential` Client and you need to
|
||||||
In tab `Service Account Roles` you can configure the roles available to the service account retrieved on behalf of this client.
|
In tab `Service Account Roles` you can configure the roles available to the service account retrieved on behalf of this client.
|
||||||
Don't forget that you need those roles to be available in Scopes of this client as well (unless you have `Full Scope Allowed` on). As in normal login, roles from access token are the intersection of scopes and the service account roles.
|
Don't forget that you need those roles to be available in Scopes of this client as well (unless you have `Full Scope Allowed` on). As in normal login, roles from access token are the intersection of scopes and the service account roles.
|
||||||
|
|
||||||
The REST URL to invoke on is `/\{server-root-usualy-auth}/realms/\{realm-name}/protocol/openid-connect/token`.
|
The REST URL to invoke on is `/auth/realms/\{realm-name}/protocol/openid-connect/token`.
|
||||||
Invoking on this URL is a POST request and requires you to post the client credentials.
|
Invoking on this URL is a POST request and requires you to post the client credentials.
|
||||||
By default, client credentials are represented by clientId and clientSecret of the client in `Authorization: Basic` header, but you can also authenticate the client with a signed JWT assertion or any other custom mechanism for client authentication.
|
By default, client credentials are represented by clientId and clientSecret of the client in `Authorization: Basic` header, but you can also authenticate the client with a signed JWT assertion or any other custom mechanism for client authentication.
|
||||||
You also need to use the parameter `grant_type=client_credentials` as per the OAuth2 specification.
|
You also need to use the parameter `grant_type=client_credentials` as per the OAuth2 specification.
|
||||||
|
|
Loading…
Reference in a new issue