-
Notifications
You must be signed in to change notification settings - Fork 0
Security Configuration
github-actions[bot] edited this page Sep 11, 2025
·
1 revision
This document describes the available security configuration options for the mnestix-proxy project, focusing on integration with Keycloak and Azure Entra ID.
Keycloak is an open-source identity and access management solution. To enable Keycloak authentication in mnestix-proxy:
-
Configuration:
Update yourappsettings.json
with the following section:"OpenId": { "EnableOpenIdAuth": "true", "Issuer": "https://<keycloak-server>/realms/<realm-name>", "ClientID": "<client-id>", "RequireHttpsMetadata": "false" },
-
Usage:
The proxy will validate JWT tokens issued by Keycloak. Ensure your clients obtain tokens from Keycloak and include them in theAuthorization: Bearer <token>
header.
Azure Entra ID provides cloud-based identity management. To enable Azure Entra ID authentication:
-
Configuration:
Update yourappsettings.json
with the following section:"AzureAd": { "EnableAzureAdAuth": "true", "Instance": "https://login.microsoftonline.com/", "ClientId": "<client-id>", "Domain": "<your-domain>", "TenantId": "<tenant-id>" }
-
Usage:
The proxy will validate JWT tokens issued by Azure Entra ID. Clients must authenticate with Azure Entra ID and include the token in theAuthorization
header.
- Both Keycloak and Azure Entra ID configurations rely on the standard ASP.NET Core authentication middleware.
- Ensure the
Audience
matches your application's client ID. - For development, you may set
RequireHttpsMetadata
tofalse
, but it is recommended to usetrue
in production.
For more details, refer to the authentication setup in Program.cs
and the Authentication
folder.