sync with latest changes
This commit is contained in:
commit
e70b626fb1
3 changed files with 8 additions and 3 deletions
|
@ -174,6 +174,7 @@ public class CustomerService {
|
||||||
This section describes how to secure a WAR directly by adding config and editing files within your WAR package.
|
This section describes how to secure a WAR directly by adding config and editing files within your WAR package.
|
||||||
|
|
||||||
The first thing you must do is create a `keycloak.json` adapter config file within the `WEB-INF` directory of your WAR.
|
The first thing you must do is create a `keycloak.json` adapter config file within the `WEB-INF` directory of your WAR.
|
||||||
|
|
||||||
The format of this config file is describe in the <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>> section.
|
The format of this config file is describe in the <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>> section.
|
||||||
|
|
||||||
Next you must set the `auth-method` to `KEYCLOAK` in `web.xml`.
|
Next you must set the `auth-method` to `KEYCLOAK` in `web.xml`.
|
||||||
|
@ -259,7 +260,9 @@ This metadata is instead defined within server configuration (i.e. `standalone.x
|
||||||
|
|
||||||
The `secure-deployment` `name` attribute identifies the WAR you want to secure.
|
The `secure-deployment` `name` attribute identifies the WAR you want to secure.
|
||||||
Its value is the `module-name` defined in `web.xml` with `.war` appended.
|
Its value is the `module-name` defined in `web.xml` with `.war` appended.
|
||||||
|
|
||||||
The rest of the configuration corresponds pretty much one to one with the `keycloak.json` configuration options defined in <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>>.
|
The rest of the configuration corresponds pretty much one to one with the `keycloak.json` configuration options defined in <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>>.
|
||||||
|
|
||||||
The exception is the `credential` element.
|
The exception is the `credential` element.
|
||||||
|
|
||||||
To make it easier for you, you can go to the {{book.project.title}} Administration Console and go to the Application/Installation tab of the application this WAR is aligned with.
|
To make it easier for you, you can go to the {{book.project.title}} Administration Console and go to the Application/Installation tab of the application this WAR is aligned with.
|
||||||
|
|
|
@ -58,6 +58,7 @@ This is a Jetty specific config file and you must define a Keycloak specific aut
|
||||||
----
|
----
|
||||||
|
|
||||||
Next you must create a `keycloak.json` adapter config file within the `WEB-INF` directory of your WAR.
|
Next you must create a `keycloak.json` adapter config file within the `WEB-INF` directory of your WAR.
|
||||||
|
|
||||||
The format of this config file is describe in the <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>> section.
|
The format of this config file is describe in the <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>> section.
|
||||||
|
|
||||||
WARNING: The Jetty 9.1.x adapter will not be able to find the `keycloak.json` file.
|
WARNING: The Jetty 9.1.x adapter will not be able to find the `keycloak.json` file.
|
||||||
|
|
|
@ -45,7 +45,8 @@ This is a Tomcat specific config file and you must define a Keycloak specific Va
|
||||||
----
|
----
|
||||||
|
|
||||||
Next you must create a `keycloak.json` adapter config file within the `WEB-INF` directory of your WAR.
|
Next you must create a `keycloak.json` adapter config file within the `WEB-INF` directory of your WAR.
|
||||||
The format of this config file is describe in the <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>> section.
|
|
||||||
|
The format of this config file is describe in the <<fake/../java-adapter-config.adoc#_java_adapter_config,Java adapter configuration>>
|
||||||
|
|
||||||
Finally you must specify both a `login-config` and use standard servlet security to specify role-base constraints on your URLs.
|
Finally you must specify both a `login-config` and use standard servlet security to specify role-base constraints on your URLs.
|
||||||
Here's an example:
|
Here's an example:
|
||||||
|
|
Loading…
Reference in a new issue