You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _generated-doc/main/infra/quarkus-maven-plugin-goals.adoc
+13-4Lines changed: 13 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3837,7 +3837,7 @@ Skip the execution of this mojo
3837
3837
3838
3838
= quarkus:update
3839
3839
3840
-
Log Quarkus-related recommended updates, such as new Quarkus platform BOM versions and Quarkus extensions versions that aren't managed by the Quarkus platform BOMs.
3840
+
Suggest project updatesand create a recipe with the possibility to apply it.
@@ -244,7 +250,7 @@ Then, add the `os-maven-plugin` extension and the `protobuf-maven-plugin` config
244
250
----
245
251
246
252
<1> The `protobuf-maven-plugin` generates stub classes from your gRPC service definition (`proto` files).
247
-
<2> Class generation uses the tool `protoc`, which is OS-specific. This is why we use the `os-maven-plugin` to target the executable compatible with the operating system.
253
+
<2> Class generation uses the tool `protoc`, which is OS-specific. This is why we use the Nisse Maven plugin to target the executable compatible with the operating system.
248
254
249
255
Note: This configuration instructs the `protobuf-maven-plugin` to generate default gRPC classes and classes using Mutiny to fit with the Quarkus development experience.
Copy file name to clipboardExpand all lines: _versions/main/guides/security-keycloak-authorization.adoc
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,9 +20,9 @@ The Keycloak Authorization extension, `quarkus-keycloak-authorization`, extends
20
20
It features a policy enforcer that dynamically manages access to secured resources.
21
21
Access is governed by permissions defined in Keycloak, supporting flexible and dynamic Resource-Based Access Control (RBAC).
22
22
23
-
Use the `quarkus-keycloak-authorization` extension only if you are using Keycloak and Keycloak Authorization Services is enabled in your environment to handle authorization decisions.
23
+
Use the `quarkus-keycloak-authorization` extension only if you are using Keycloak and the Keycloak Authorization Services feature is enabled in your environment to handle authorization decisions.
24
24
25
-
If you are not using Keycloak, or if Keycloak is configured without Keycloak Authorization Services, use the `quarkus-oidc` extension instead.
25
+
If you are not using Keycloak, or if Keycloak is configured without the Keycloak Authorization Services feature, use the `quarkus-oidc` extension instead.
26
26
27
27
.How it works
28
28
@@ -52,7 +52,7 @@ It complements explicit mechanisms such as role-based access control with dynami
52
52
53
53
Before using this extension, ensure the following:
54
54
55
-
. Keycloak Authorization Services is enabled in your Keycloak instance.
55
+
. Keycloak Authorization Services feature is enabled in your Keycloak instance.
56
56
. Your Quarkus application includes the `quarkus-keycloak-authorization` extension.
57
57
58
58
For detailed steps, see the xref:security-oidc-bearer-token-authentication.adoc[OIDC Bearer Token Authentication] guide.
<1> For `keycloak.version`, ensure the version is `26.0.7` or later.
324
323
<2> For Keycloak keystore, use the `keycloak-keystore.jks` file located at https://github.com/quarkusio/quarkus-quickstarts/blob/main/security-keycloak-authorization-quickstart/config/keycloak-keystore.jks[quarkus-quickstarts/security-keycloak-authorization-quickstart/config].
325
324
@@ -335,7 +334,8 @@ docker run --name keycloak \
335
334
To create a new realm, import the link:{quickstarts-tree-url}/security-keycloak-authorization-quickstart/config/quarkus-realm.json[realm configuration file].
336
335
For detailed steps on creating realms, refer to the Keycloak documentation: https://www.keycloak.org/docs/latest/server_admin/index.html#_create-realm[Create a new realm].
337
336
338
-
After importing the realm, you can review the resource permissions:
337
+
After importing the realm, go to Clients, choose the `backend-service` client, and select the Authorization and Resources tab for this client.
@@ -661,7 +661,7 @@ public class ProtectedResource {
661
661
<1> The `/standard-way` sub-path requires both the resource permission and the `read` scope, based on the configuration set in the `application.properties` file.
662
662
<2> The `/programmatic-way` sub-path checks only for the `Scope Permission Resource` permission by default. However, you can enforce additional constraints, such as scope requirements, by using `SecurityIdentity#checkPermission`.
663
663
<3> The `@PermissionsAllowed` annotation at `/annotation-way` restricts access to requests that have the `Scope Permission Resource` permission along with the `read` scope.
664
-
For more information, see the section xref:security-authorize-web-endpoints-reference.adoc#standard-security-annotations[Authorization using annotations] of the Security Authorization guide.
664
+
For more information, see the section xref:security-authorize-web-endpoints-reference.adoc#standard-security-annotations[Authorization using annotations] of the Authorization of web endpoints guide.
665
665
666
666
== Multi-tenancy
667
667
@@ -735,7 +735,7 @@ public class CustomTenantPolicyConfigResolver implements TenantPolicyConfigResol
735
735
private final KeycloakPolicyEnforcerTenantConfig newTenantConfig;
736
736
737
737
public CustomTenantPolicyConfigResolver(KeycloakPolicyEnforcerConfig enforcerConfig) {
0 commit comments