You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: templates/sso75-https.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
"annotations": {
6
6
"iconClass" : "icon-sso",
7
7
"tags" : "sso,keycloak,jboss,hidden",
8
-
"version": "7.5.1.GA",
8
+
"version": "7.5.2.GA",
9
9
"openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJDK (Ephemeral with passthrough TLS)",
10
10
"openshift.io/provider-display-name": "Red Hat, Inc.",
11
11
"description": "An example application based on RH-SSO 7.5 on OpenJDK image. For more information about using this template, see https://github.com/jboss-container-images/redhat-sso-7-openshift-image/tree/sso75-cpaas-dev/docs.",
@@ -17,7 +17,7 @@
17
17
},
18
18
"labels": {
19
19
"template": "sso75-https",
20
-
"rhsso": "7.5.1.GA"
20
+
"rhsso": "7.5.2.GA"
21
21
},
22
22
"message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.",
Copy file name to clipboardExpand all lines: templates/sso75-ocp4-x509-https.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
"annotations": {
6
6
"iconClass" : "icon-sso",
7
7
"tags" : "sso,keycloak,jboss",
8
-
"version": "7.5.1.GA",
8
+
"version": "7.5.2.GA",
9
9
"openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJDK (Ephemeral)",
10
10
"openshift.io/provider-display-name": "Red Hat, Inc.",
11
11
"description": "An example application based on RH-SSO 7.5 on OpenJDK image. For more information about using this template, see https://github.com/jboss-container-images/redhat-sso-7-openshift-image/tree/sso75-cpaas-dev/docs.",
@@ -17,7 +17,7 @@
17
17
},
18
18
"labels": {
19
19
"template": "sso75-ocp4-x509-https",
20
-
"rhsso": "7.5.1.GA"
20
+
"rhsso": "7.5.2.GA"
21
21
},
22
22
"message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.",
Copy file name to clipboardExpand all lines: templates/sso75-ocp4-x509-postgresql-persistent.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
"annotations": {
6
6
"iconClass" : "icon-sso",
7
7
"tags" : "sso,keycloak,jboss",
8
-
"version": "7.5.1.GA",
8
+
"version": "7.5.2.GA",
9
9
"openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJDK + PostgreSQL (Persistent)",
10
10
"openshift.io/provider-display-name": "Red Hat, Inc.",
11
11
"description": "An example application based on RH-SSO 7.5 on OpenJDK image. For more information about using this template, see https://github.com/jboss-container-images/redhat-sso-7-openshift-image/tree/sso75-cpaas-dev/docs.",
"message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.",
Copy file name to clipboardExpand all lines: templates/sso75-postgresql-persistent.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
"annotations": {
6
6
"iconClass" : "icon-sso",
7
7
"tags" : "sso,keycloak,jboss,hidden",
8
-
"version": "7.5.1.GA",
8
+
"version": "7.5.2.GA",
9
9
"openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJDK + PostgreSQL (Persistent with passthrough TLS)",
10
10
"openshift.io/provider-display-name": "Red Hat, Inc.",
11
11
"description": "An example application based on RH-SSO 7.5 on OpenJDK image. For more information about using this template, see https://github.com/jboss-container-images/redhat-sso-7-openshift-image/tree/sso75-cpaas-dev/docs.",
@@ -17,7 +17,7 @@
17
17
},
18
18
"labels": {
19
19
"template": "sso75-postgresql-persistent",
20
-
"rhsso": "7.5.1.GA"
20
+
"rhsso": "7.5.2.GA"
21
21
},
22
22
"message": "A new persistent RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.",
Copy file name to clipboardExpand all lines: templates/sso75-postgresql.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
"annotations": {
6
6
"iconClass" : "icon-sso",
7
7
"tags" : "sso,keycloak,jboss,hidden",
8
-
"version": "7.5.1.GA",
8
+
"version": "7.5.2.GA",
9
9
"openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJDK + PostgreSQL (Ephemeral with passthrough TLS)",
10
10
"openshift.io/provider-display-name": "Red Hat, Inc.",
11
11
"description": "An example application based on RH-SSO 7.5 on OpenJDK image. For more information about using this template, see https://github.com/jboss-container-images/redhat-sso-7-openshift-image/tree/sso75-cpaas-dev/docs.",
@@ -17,7 +17,7 @@
17
17
},
18
18
"labels": {
19
19
"template": "sso75-postgresql",
20
-
"rhsso": "7.5.1.GA"
20
+
"rhsso": "7.5.2.GA"
21
21
},
22
22
"message": "A new RH-SSO service (using PostgreSQL) has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The username/password for accessing the PostgreSQL database \"${DB_DATABASE}\" is ${DB_USERNAME}/${DB_PASSWORD}. Please be sure to create the following secrets: \"${HTTPS_SECRET}\" containing the ${HTTPS_KEYSTORE} file used for serving secure content; \"${JGROUPS_ENCRYPT_SECRET}\" containing the ${JGROUPS_ENCRYPT_KEYSTORE} file used for securing JGroups communications; \"${SSO_TRUSTSTORE_SECRET}\" containing the ${SSO_TRUSTSTORE} file used for securing RH-SSO requests.",
Copy file name to clipboardExpand all lines: templates/sso75-x509-https.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
"annotations": {
6
6
"iconClass" : "icon-sso",
7
7
"tags" : "sso,keycloak,jboss",
8
-
"version": "7.5.1.GA",
8
+
"version": "7.5.2.GA",
9
9
"openshift.io/display-name": "Red Hat Single Sign-On 7.5 on OpenJDK (Ephemeral)",
10
10
"openshift.io/provider-display-name": "Red Hat, Inc.",
11
11
"description": "An example application based on RH-SSO 7.5 on OpenJDK image. For more information about using this template, see https://github.com/jboss-container-images/redhat-sso-7-openshift-image/tree/sso75-cpaas-dev/docs.",
@@ -17,7 +17,7 @@
17
17
},
18
18
"labels": {
19
19
"template": "sso75-x509-https",
20
-
"rhsso": "7.5.1.GA"
20
+
"rhsso": "7.5.2.GA"
21
21
},
22
22
"message": "A new RH-SSO service has been created in your project. The admin username/password for accessing the master realm via the RH-SSO console is ${SSO_ADMIN_USERNAME}/${SSO_ADMIN_PASSWORD}. The HTTPS keystore used for serving secure content, the JGroups keystore used for securing JGroups communications, and server truststore used for securing RH-SSO requests were automatically created via OpenShift's service serving x509 certificate secrets.",
0 commit comments