Replies: 4 comments 4 replies
-
/cc @pedroigor (oidc), @sberyozkin (oidc) |
Beta Was this translation helpful? Give feedback.
-
If I understand it correctly, the client id and secret are already available in the incoming Authorization Basic scheme value, and it is totally dynamic, so can not be preconfigured, right ? In that case I think you have to create OidcClient programmatically, see an example in https://quarkus.io/guides/security-openid-connect-client-reference#use-oidc-clients, and then decode the incoming Can you try it please ? |
Beta Was this translation helpful? Give feedback.
-
There’s no client_id/secret available explicitly.
Should I use the credentials for the Basic Auth as those as well do you mean?
|
Beta Was this translation helpful? Give feedback.
-
I worked it out. "%dev":
quarkus:
oidc-client:
grant-options:
password:
username: ${my.username}
password: ${my.password}
grant:
type: client
discovery-enabled: true
client-id: ${my.username}
credentials:
secret: ${my.password}
token-path: ${my.url}${my.tokenPath}
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I have an endpoint I need to connect to for a REST query but first I need to obtain an access token.
I'd like to use the OIDC client in Quarkus but my endpoint is protected with Basic Auth so I need to send that header.
After retrieving the access_token I can use that without Basic Auth anymore.
Is it possible to use the Quarkus properties for this?
I have tried using the OIDC Client but it always fails, one obstacle is the mandatory client_id.
My endpoint does not require client_id or client_secret, the grant_type is client_credentials.
Maybe this is not possible and the implementation made on the endpoint is an oxymoron? ¯_(ツ)_/¯
Beta Was this translation helpful? Give feedback.
All reactions