Skip to content

Commit fd5f08c

Browse files
Release version 1.0.0
1 parent fce76e2 commit fd5f08c

File tree

5 files changed

+10
-11
lines changed

5 files changed

+10
-11
lines changed

.github/workflows/docker-build.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ env:
1111
# github.repository as <account>/<repo>
1212
IMAGE_NAME: mnestix-proxy
1313
# Update the version manually
14-
IMAGE_TAG_VERSION: 0.1.0
14+
IMAGE_TAG_VERSION: 1.0.0
1515

1616
jobs:
1717
run-tests:

compose.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
services:
77
mnestix-proxy:
88
container_name: mnestix-proxy
9-
image: mnestix/mnestix-proxy:0.1.0
9+
image: mnestix/mnestix-proxy:1.0.0
1010
ports:
1111
- '5065:5065'
1212
environment:

wiki/Getting-started-with-developing.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ Before you start developing with **mnestix-proxy**, ensure you have the followin
66

77
- **.NET 8 SDK** (required for building and running the project)
88
- **Git** (for version control)
9-
- **Visual Studio Code** or **JetBrains Rider** (recommended IDEs)
109
- **Docker** (optional, for containerized development and testing)
1110

1211
## Project Structure

wiki/Proxy-Configuration-Settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Defines backend destinations for each route:
6060
- **aasRepoCluster**: `http://localhost:8081/`
6161
- **submodelRepoCluster**: `http://localhost:8081/`
6262
- **discoveryCluster**: `http://localhost:8082/`
63-
- **influxCluster**: `http://20.224.163.243:8086`
63+
- **influxCluster**: `http://<your-domain>:<port>`
6464

6565
---
6666

wiki/Security-Configuration.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Security Configuration
22

3-
This document describes the available security configuration options for the mnestix-proxy project, focusing on integration with **Keycloak** and **Azure Active Directory**.
3+
This document describes the available security configuration options for the mnestix-proxy project, focusing on integration with **Keycloak** and **Azure Entra ID**.
44

55
## Keycloak
66

@@ -10,7 +10,7 @@ Keycloak is an open-source identity and access management solution. To enable Ke
1010
Update your `appsettings.json` with the following section:
1111
```json
1212
"OpenId": {
13-
"EnableOpenIdAuth": "false",
13+
"EnableOpenIdAuth": "true",
1414
"Issuer": "https://<keycloak-server>/realms/<realm-name>",
1515
"ClientID": "<client-id>",
1616
"RequireHttpsMetadata": "false"
@@ -20,28 +20,28 @@ Keycloak is an open-source identity and access management solution. To enable Ke
2020
The proxy will validate JWT tokens issued by Keycloak. Ensure your clients obtain tokens from Keycloak and include them in the `Authorization: Bearer <token>` header.
2121

2222

23-
## Azure Active Directory
23+
## Azure Entra ID
2424

25-
Azure AD provides cloud-based identity management. To enable Azure AD authentication:
25+
Azure Entra ID provides cloud-based identity management. To enable Azure Entra ID authentication:
2626

2727
- **Configuration**:
2828
Update your `appsettings.json` with the following section:
2929
```json
3030
"AzureAd": {
31-
"EnableAzureAdAuth": "false",
31+
"EnableAzureAdAuth": "true",
3232
"Instance": "https://login.microsoftonline.com/",
3333
"ClientId": "<client-id>",
3434
"Domain": "<your-domain>",
3535
"TenantId": "<tenant-id>"
3636
}
3737
```
3838
- **Usage**:
39-
The proxy will validate JWT tokens issued by Azure AD. Clients must authenticate with Azure AD and include the token in the `Authorization` header.
39+
The proxy will validate JWT tokens issued by Azure Entra ID. Clients must authenticate with Azure Entra ID and include the token in the `Authorization` header.
4040

4141

4242
## Additional Notes
4343

44-
- Both Keycloak and Azure AD configurations rely on the standard ASP.NET Core authentication middleware.
44+
- Both Keycloak and Azure Entra ID configurations rely on the standard ASP.NET Core authentication middleware.
4545
- Ensure the `Audience` matches your application's client ID.
4646
- For development, you may set `RequireHttpsMetadata` to `false`, but it is recommended to use `true` in production.
4747

0 commit comments

Comments
 (0)