-
Notifications
You must be signed in to change notification settings - Fork 324
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: allow use of custom client authenticator types #845
fix: allow use of custom client authenticator types #845
Conversation
docs/resources/openid_client.md
Outdated
@@ -53,7 +53,7 @@ resource "keycloak_openid_client" "openid_client" { | |||
URIs for security. This client should be used for applications using the Implicit grant flow. | |||
- `BEARER-ONLY` - Used for services that never initiate a login. This client will only allow bearer token requests. | |||
- `client_secret` - (Optional) The secret for clients with an `access_type` of `CONFIDENTIAL` or `BEARER-ONLY`. This value is sensitive and should be treated with the same care as a password. If omitted, this will be generated by Keycloak. | |||
- `client_authenticator_type` - (Optional) Defaults to `client-secret` The authenticator type for clients with an `access_type` of `CONFIDENTIAL` or `BEARER-ONLY`. Can be one of the following: | |||
- `client_authenticator_type` - (Optional) Defaults to `client-secret`. The authenticator type for clients with an `access_type` of `CONFIDENTIAL` or `BEARER-ONLY`. The following types are available on an unmodified Keycloak server: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggestions appreciated
"unmodified" isn't as descriptive as I'd like. Has supporting Keycloak plugins been a concern in the past (and might there be documentation I can align with)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll change this to something like A default Keycloak installation will have the following available types
7868335
to
1b36e18
Compare
727fbb8
to
a36d505
Compare
a36d505
to
91597eb
Compare
Sorry for the long delay on this. I don't consider this a breaking change since it won't affect any existing configuration. I'll merge and release this today. |
Fixes #842.
I'm assuming this is considered a breaking change. Is there a recommended way to flag this?
I was reluctant to add an acceptance test for a fake custom client authenticator (dummy value) since it would break if Keycloak was changed to validate the authenticator in future.