You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-`oauth.valid.issuer.uri` (e.g.: "https://localhost:8443/realms/demo" - only access tokens issued by this issuer will be accepted)
300
300
301
301
Some authorization servers don't provide the `iss` claim. In that case you would not set `oauth.valid.issuer.uri`, and you would explicitly turn off issuer checking by setting the following option to `false`:
302
302
-`oauth.check.issuer` (e.g. "false")
@@ -373,8 +373,8 @@ When your authorization server is configured to use opaque tokens (not JWT) or i
373
373
This will result in Kafka Broker making a request to authorization server every time a new Kafka client connection is established.
If the user id could not be extracted from Introspection Endpoint response, then the same rules (`oauth.username.claim`, `oauth.fallback.username.claim`, `oauth.fallback.username.prefix`) will be used to try extract the user id from User Info Endpoint response.
433
433
@@ -529,7 +529,7 @@ When configuring the listener for `SASL/PLAIN` using `org.apache.kafka.common.se
529
529
530
530
There is an additional `oauth.*` option you can specify (it's optional):
If this option is not specified the listener treats the `username` parameter of the SASL/PLAIN authentication as the account name, and the `password` parameter as the raw access token which is passed to the validation as if SASL/OAUTHBEARER was used.
535
535
@@ -558,7 +558,7 @@ All the Kafka brokers in the cluster should be configured with the same client I
558
558
When you configure your listener to support OAuth, you can configure it to support OAUTHBEARER, but you can also configure it to support the OAuth over PLAIN as explained previously. PLAIN does not make much sense on the broker for inter-broker communication since OAUTHBEARER is supported. Therefore, it is best to only use OAUTHBEARER mechanism for inter-broker communication.
559
559
560
560
Specify the following `oauth.*` properties in `sasl.jaas.config` configuration:
@@ -707,7 +707,7 @@ You also need a properly configured OAuth authentication support, as described i
707
707
All the configuration properties for KeycloakAuthorizer begin with a `strimzi.authorization.` prefix.
708
708
709
709
The token endpoint used by KeycloakAuthorizer has to be the same as the one used for OAuth authentication:
710
-
-`strimzi.authorization.token.endpoint.uri` (e.g.: "https://localhost:8443/auth/realms/demo/protocol/openid-connect/token" - the endpoint used to exchange the access token for a list of grants)
710
+
-`strimzi.authorization.token.endpoint.uri` (e.g.: "https://localhost:8443/realms/demo/protocol/openid-connect/token" - the endpoint used to exchange the access token for a list of grants)
711
711
-`strimzi.authorization.client.id` (e.g.: "kafka" - the client representing a Kafka Broker which has Authorization Services enabled)
712
712
713
713
The authorizer will regularly reload the list of grants for active sessions. By default, it will do this once every minute.
0 commit comments