commit
ff0589ed0a
2 changed files with 4 additions and 4 deletions
|
@ -115,7 +115,7 @@ See `kcadm.sh config credentials --help` for more information about starting an
|
|||
By default, `Admin CLI` automatically maintains a configuration file at a default location - `.keycloak/kcadm.config`
|
||||
under user's home directory.
|
||||
|
||||
You can use `--config` option at any time to point to a different file / location. This way you can mantain multiple authenticated
|
||||
You can use `--config` option at any time to point to a different file / location. This way you can maintain multiple authenticated
|
||||
sessions in parallel. It is safest to perform operations tied to a single config file from a single thread.
|
||||
|
||||
Make sure to not make a config file visible to other users on the system as it contains access tokens, and secrets that should be kept private.
|
||||
|
@ -256,7 +256,7 @@ It's very simple to delete a realm:
|
|||
|
||||
Turning on all login page options for the realm::
|
||||
|
||||
Set the attributes controlling specific capabilites to `true`.
|
||||
Set the attributes controlling specific capabilities to `true`.
|
||||
|
||||
For example:
|
||||
|
||||
|
@ -663,7 +663,7 @@ Use `delete` operation with the same endpoint uri as for getting a specific clie
|
|||
|
||||
Creating a user::
|
||||
|
||||
A new user can be created using `create` command agains `users` endpoint. For example:
|
||||
A new user can be created using the `create` command against the `users` endpoint. For example:
|
||||
|
||||
$ kcadm.sh create users -r demorealm -s username=testuser -s enabled=true
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
|
||||
=== Compromised Access and Refresh Tokens
|
||||
|
||||
There are a few things you can do to mitigate access tokens and refresh tokens from being stolen. The most important thing is to enforce SSL/HTTPS communication between {{book.project.name}} and its clients and applications. It might seem obvious, but since {{book.project.name}} does not have SSL enabled by default, an adminstrator might not realize that it is necessary.
|
||||
There are a few things you can do to mitigate access tokens and refresh tokens from being stolen. The most important thing is to enforce SSL/HTTPS communication between {{book.project.name}} and its clients and applications. It might seem obvious, but since {{book.project.name}} does not have SSL enabled by default, an administrator might not realize that it is necessary.
|
||||
|
||||
Another thing you can do to mitigate leaked access tokens is to shorten their lifespans. You can specify this within the <<fake/../../sessions/timeouts.adoc#_timeouts, timeouts page>>.
|
||||
Short lifespans (minutes) for access tokens for clients and applications to refresh their access tokens after a short amount of time. If an admin detects a leak, they can logout all user sessions to invalidate these refresh tokens or set up a revocation policy. Making sure refresh tokens always stay private to the client and are never transmitted ever is very important as well.
|
||||
|
|
Loading…
Reference in a new issue