diff --git a/docbook/reference/en/en-US/modules/clustering.xml b/docbook/reference/en/en-US/modules/clustering.xml index a70bbb0921..350c47feeb 100755 --- a/docbook/reference/en/en-US/modules/clustering.xml +++ b/docbook/reference/en/en-US/modules/clustering.xml @@ -216,4 +216,25 @@ +
+ Troubleshooting + + Note that when you run cluster, you should see message similar to this in the log of both cluster nodes: + + + + If you see just one node mentioned, it's possible that your cluster hosts are not joined together. + + + Usually it's best practice to have your cluster nodes on private network without firewall for communication among them. + Firewall could be enabled just on public access point to your network instead. If for some reason you still need to have firewall + enabled on cluster nodes, you will need to open some ports. Default values are UDP port 55200 and multicast port 45688 + with multicast address 230.0.0.4. Note that you may need more ports opened if you want to enable additional features like diagnostics for your JGroups stack. + Keycloak delegates most of the clustering work to Infinispan/JGroups, so consult EAP or JGroups documentation for more info. + +
+ diff --git a/docbook/reference/en/en-US/modules/jetty9-adapter.xml b/docbook/reference/en/en-US/modules/jetty9-adapter.xml index ad7d1c86b1..57dd8028fe 100755 --- a/docbook/reference/en/en-US/modules/jetty9-adapter.xml +++ b/docbook/reference/en/en-US/modules/jetty9-adapter.xml @@ -145,7 +145,7 @@ $ java -jar $JETTY_HOME/start.jar --add-to-startd=keycloak BASIC - this is ignored currently/realm-name> + this is ignored currently diff --git a/docbook/reference/en/en-US/modules/security-vulnerabilities.xml b/docbook/reference/en/en-US/modules/security-vulnerabilities.xml index 49a29882fe..513702a37d 100755 --- a/docbook/reference/en/en-US/modules/security-vulnerabilities.xml +++ b/docbook/reference/en/en-US/modules/security-vulnerabilities.xml @@ -4,7 +4,7 @@ This chapter discusses possible security vulnerabilities Keycloak could have, how Keycloak mitigates those vulnerabilities, and what steps you need to do to configure Keycloak to mitigate some vulnerabilities. A good list of potential vulnerabilities and what security implementations should do to mitigate them can be found in the - OAuth 2.0 Thread Model document put out by the IETF. Many of those vulnerabilities are discussed here. + OAuth 2.0 Threat Model document put out by the IETF. Many of those vulnerabilities are discussed here.
SSL/HTTPS Requirement diff --git a/testsuite/integration/src/test/java/org/keycloak/testsuite/jaxrs/JaxrsFilterTest.java b/testsuite/integration/src/test/java/org/keycloak/testsuite/jaxrs/JaxrsFilterTest.java index 936792dc05..16f00f525b 100644 --- a/testsuite/integration/src/test/java/org/keycloak/testsuite/jaxrs/JaxrsFilterTest.java +++ b/testsuite/integration/src/test/java/org/keycloak/testsuite/jaxrs/JaxrsFilterTest.java @@ -317,6 +317,7 @@ public class JaxrsFilterTest { // @Test public void testCxfExample() { String uri = "http://localhost:9000/customerservice/customers/123"; + //String uri = "http://localhost:8080/jax_rs_basic_servlet/services/service1/customerservice/customers/123"; Response resp = client.target(uri).request() .get(); Assert.assertEquals(resp.getStatus(), 401);