Skip to content

Commit d2e9088

Browse files
Style n grammar edits to security overview doc
Reverted the downstream xrefs for testing on PV2 Fix QE comments Fix typo in section ID Fix anchiors Fixed anchors Fix xref Fix xref
1 parent eedd893 commit d2e9088

File tree

2 files changed

+34
-36
lines changed

2 files changed

+34
-36
lines changed

docs/src/main/asciidoc/security-authentication-mechanisms-concept.adoc

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ Before you choose an authentication mechanism for securing your Quarkus applicat
1717
Some supported authentication mechanisms are built into Quarkus, while others require you to add an extension.
1818
All of these mechanisms are detailed in the following sections:
1919

20-
* xref:built-in-authentication-mechanisms[Built-in authentication mechanisms]
21-
* xref:other-supported-authentication-mechanisms[Other supported authentication mechanisms]
20+
* <<built-in-authentication-mechanisms>>
21+
* <<other-supported-authentication-mechanisms>>
2222

2323
The following table maps specific authentication requirements to a supported mechanism that you can use in Quarkus:
2424

@@ -27,29 +27,29 @@ The following table maps specific authentication requirements to a supported mec
2727
|====
2828
|Authentication requirement |Authentication mechanism
2929

30-
|Username and password |xref:security-basic-authentication-concept.adoc[Basic], xref:security-authentication-mechanisms-concept.adoc#form-auth[Form]
30+
|Username and password |xref:security-basic-authentication-concept.adoc[Basic], <<form-auth>>
3131

3232
|Bearer access token |xref:security-oidc-bearer-token-authentication-concept.adoc[OIDC Bearer token authentication], xref:security-jwt.adoc[JWT], xref:security-oauth2.adoc[OAuth2]
3333

34-
|Single sign-on (SSO) |xref:security-oidc-code-flow-authentication-concept.adoc[OIDC Code Flow], xref:security-authentication-mechanisms-concept.adoc#form-auth[Form]
34+
|Single sign-on (SSO) |xref:security-oidc-code-flow-authentication-concept.adoc[OIDC Code Flow], <<form-auth>>
3535

36-
|Client certificate |xref:security-authentication-mechanisms-concept.adoc#mutual-tls[mutual TLS (mTLS)]
36+
|Client certificate |<<mutual-tls>>
3737

3838
|WebAuthn |xref:security-webauthn-concept.adoc[WebAuthn]
3939

4040
|Kerberos ticket |link:https://quarkiverse.github.io/quarkiverse-docs/quarkus-kerberos/dev/index.html[Kerberos]
4141
|====
4242

43-
For more information, see the following xref:table[Token authentication mechanism comparison] table.
43+
For more information, see the following <<table>> table.
4444

4545
[[built-in-authentication-mechanisms]]
4646
== Built-in authentication mechanisms
4747

4848
Quarkus Security provides the following built-in authentication support:
4949

5050
* xref:security-basic-authentication-concept.adoc[Basic authentication]
51-
* xref:form-auth[Form-based authentication]
52-
* xref:mutual-tls[mutual TLS authentication]
51+
* <<form-auth>>
52+
* <<mutual-tls>>
5353

5454
=== Basic authentication
5555

@@ -157,10 +157,10 @@ For more information about customizing `SecurityIdentity`, see the link:{url-qua
157157

158158
Quarkus Security also supports the following authentication mechanisms through extensions:
159159

160-
* xref:webauthn-authentication[WebAuthn authentication]
161-
* xref:openid-connect-authentication[OpenID Connect authentication]
162-
* xref:smallrye-jwt-authentication[SmallRye JWT authentication]
163-
* xref:oauth2-authentication[OAuth2 authentication]
160+
* <<webauthn-authentication>>
161+
* <<openid-connect-authentication>>
162+
* <<smallrye-jwt-authentication>>
163+
* <<oauth2-authentication>>
164164

165165
[[webauthn-authentication]]
166166
=== WebAuthn authentication
@@ -185,7 +185,7 @@ However, opaque, also known as binary tokens, can only be introspected remotely.
185185

186186
[NOTE]
187187
====
188-
Using the Quarkus OIDC extension, both the Bearer token and Authorization Code Flow authentication mechanisms use xref:smallrye-jwt-authentication[SmallRye JWT authentication] to represent JWT tokens as MicroProfile JWT `org.eclipse.microprofile.jwt.JsonWebToken`.
188+
Using the Quarkus OIDC extension, both the Bearer token and Authorization Code Flow authentication mechanisms use <<smallrye-jwt-authentication>> to represent JWT tokens as MicroProfile JWT `org.eclipse.microprofile.jwt.JsonWebToken`.
189189
====
190190

191191
==== Additional Quarkus resources for OIDC authentication

docs/src/main/asciidoc/security-overview-concept.adoc

Lines changed: 21 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,17 @@ include::_attributes.adoc[]
66

77
Quarkus Security is a framework that provides the architecture, multiple authentication and authorization mechanisms, and other tools for you to build secure and production-quality Java applications.
88

9-
Before you start building security into your Quarkus applications, learn about the xref:security-architecture-concept.adoc[Quarkus Security architecture] and the different authentication mechanisms and features that you can use.
9+
Before building security into your Quarkus applications, learn about the xref:security-architecture-concept.adoc[Quarkus Security architecture] and the different authentication mechanisms and features that you can use.
1010

1111
== Key features of Quarkus Security
1212

13-
The Quarkus Security framework provides built-in security authentication mechanisms for Basic, Form-based, and mutual TLS (mTLS) authentication.
14-
You can also use other well-known xref:security-authentication-mechanisms-concept.adoc#other-supported-authentication-mechanisms[authentication mechanisms], such as OpenId Connect (OIDC) and WebAuthn.
13+
The Quarkus Security framework provides built-in security authentication mechanisms for Basic, Form-based, and mutual TLS (mTLS) authentication.
14+
You can also use other well-known xref:security-authentication-mechanisms-concept.adoc#other-supported-authentication-mechanisms[authentication mechanisms], such as OpenID Connect (OIDC) and WebAuthn.
1515

1616
Authentication mechanisms depend on xref:security-identity-providers-concept.adoc[Identity providers] to verify the authentication credentials and map them to a `SecurityIdentity` instance, which has the username, roles, original authentication credentials, and other attributes.
1717

18-
{project-name} also includes built-in security to allow for role-based access control (RBAC) based on the common security annotations @RolesAllowed, @DenyAll, @PermitAll on REST endpoints, and CDI beans.
19-
For more information, see xref:security-authorize-web-endpoints-reference.adoc[Authorization of web endpoints].
18+
{project-name} also includes built-in security to allow for role-based access control (RBAC) based on the common security annotations @RolesAllowed, @DenyAll, @PermitAll on REST endpoints, and CDI beans.
19+
For more information, see the Quarkus xref:security-authorize-web-endpoints-reference.adoc[Authorization of web endpoints] guide.
2020

2121
Quarkus Security also supports the following features:
2222

@@ -26,44 +26,43 @@ Quarkus Security also supports the following features:
2626
* <<csrf-prevention>>
2727
* <<samesite-cookies>>
2828
* <<secrets-engines>>
29-
* <<secure-serialization>>
3029
* <<rest-data-panache>>
30+
* <<secure-serialization>>
3131
* xref:security-vulnerability-detection-concept.adoc[Security vulnerability detection and National Vulnerability Database (NVD) registration]
3232

33-
Quarkus Security is also highly customizable. For more information, see xref:security-customization.adoc[Security customization].
33+
Quarkus Security is also highly customizable.
34+
For more information, see the Quarkus xref:security-customization.adoc[Security tips and tricks] guide.
3435

3536
== Getting started with Quarkus Security
3637

37-
To get started with security in Quarkus, we recommend you combine the Quarkus built-in xref:security-basic-authentication-concept.adoc[Basic authentication] with the Jakarta Persistence identity provider to enable role-based access control (RBAC).
38+
To get started with security in Quarkus, consider combining the Quarkus built-in xref:security-basic-authentication-concept.adoc[Basic authentication] with the Jakarta Persistence identity provider to enable role-based access control (RBAC).
3839
Complete the steps in the xref:security-basic-authentication-tutorial.adoc[Secure a Quarkus application with Basic authentication] tutorial.
3940

40-
After you have successfully secured your Quarkus application with Basic authentication, you can increase the security further by adding more advanced authentication mechanisms, for example, OpenID Connect (OIDC) authentication.
41-
42-
//Add a link to the recomposed OIDC intro concept here.
41+
After successfully securing your Quarkus application with Basic authentication, you can increase the security further by adding more advanced authentication mechanisms, for example, the xref:security-oidc-code-flow-authentication-concept.adoc[OpenID Connect (OIDC) authorization code flow mechanism].
4342

4443
== Quarkus Security testing
4544

46-
Guidance for testing Quarkus Security features and ensuring that your Quarkus applications are securely protected is provided in xref:security-testing.adoc[Security Testing].
45+
Guidance for testing Quarkus Security features and ensuring that your Quarkus applications are securely protected is provided in the Quarkus xref:security-testing.adoc[Security testing] guide.
4746

4847
== More about security features in Quarkus
4948

5049
[[cross-origin-resource-sharing]]
5150
=== Cross-origin resource sharing
5251

5352
To make your Quarkus application accessible to another application running on a different domain, you need to configure cross-origin resource sharing (CORS).
54-
For more information about the CORS filter that is provided by Quarkus, see the xref:http-reference.adoc#cors-filter[HTTP reference] information.
53+
For more information about the CORS filter that Quarkus provides, see the Quarkus xref:http-reference.adoc#cors-filter[CORS filter] section of the "HTTP reference" guide.
5554

5655
[[csrf-prevention]]
57-
=== Cross-site Request Forgery (CSRF) prevention
56+
=== Cross-Site Request Forgery (CSRF) prevention
5857

5958
Quarkus Security provides a RESTEasy Reactive filter that can protect your applications against a https://owasp.org/www-community/attacks/csrf[Cross-Site Request Forgery] attack.
60-
For more information, see xref:security-csrf-prevention.adoc[Cross-Site Request Forgery Prevention].
59+
For more information, see the Quarkus xref:security-csrf-prevention.adoc[Cross-Site Request Forgery Prevention] guide.
6160

6261
[[samesite-cookies]]
6362
=== SameSite cookies
6463

6564
You can add a link:https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite[SameSite] cookie property to any of the cookies set by a Quarkus endpoint.
66-
For more information, see xref:http-reference.adoc#same-site-cookie[SameSite cookies].
65+
For more information, see the Quarkus xref:http-reference.adoc#same-site-cookie[SameSite cookies] guide.
6766

6867
[[secrets-engines]]
6968
=== Secrets engines
@@ -76,19 +75,18 @@ For more information, see the link:{vault-guide}[Quarkus and HashiCorp Vault] do
7675
=== Secure serialization
7776

7877
If your Quarkus Security architecture includes RESTEasy Reactive and Jackson, Quarkus can limit the fields that are included in JSON serialization based on the configured security.
79-
For more information, see xref:resteasy-reactive.adoc#secure-serialization[Writing REST services with RESTEasy Reactive].
78+
For more information, see the Quarkus xref:resteasy-reactive.adoc#secure-serialization[Writing REST services with RESTEasy Reactive] guide.
8079

8180
[[rest-data-panache]]
8281
=== Secure auto-generated resources by REST Data with Panache
8382

84-
If you are using the REST Data with Panache extension to auto-generate your resources, you can still use the Security annotations within the package `jakarta.annotation.security`.
85-
For more information, see xref:rest-data-panache.adoc#securing-endpoints[Securing auto-generated resources].
86-
87-
== Security vulnerability detection
83+
If you use the REST Data with Panache extension to auto-generate your resources, you can still use security annotations within the package `jakarta.annotation.security`.
84+
For more information, see the xref:rest-data-panache.adoc#securing-endpoints[Securing auto-generated resources] section of the Quarkus "Generating Jakarta REST resources with Panache" guide.
8885

89-
Most of the Quarkus tags are reported in the US link:https://nvd.nist.gov[National Vulnerability Database (NVD)].
90-
For information about security vulnerabilities, see xref:security-vulnerability-detection-concept.adoc[Security vulnerability detection and reporting in Quarkus].
86+
== Security vulnerability detection
9187

88+
Most Quarkus tags get reported in the US link:https://nvd.nist.gov[National Vulnerability Database (NVD)].
89+
For information about security vulnerabilities, see the xref:security-vulnerability-detection-concept.adoc[Security vulnerability detection and reporting in Quarkus] guide.
9290

9391
== References
9492

0 commit comments

Comments
 (0)