Using a self-signed certificate in KeyCloak while using rabbitmq_auth_backend_oauth2 plug-in #10578
-
I use This is my listeners.tcp = none
listeners.ssl.default = 5671
ssl_options.certfile = /etc/rabbitmq/ssl/server.crt
ssl_options.keyfile = /etc/rabbitmq/ssl/server.key
ssl_options.versions.1 = tlsv1.3
# ---
auth_backends.1 = rabbit_auth_backend_oauth2
auth_oauth2.resource_server_id = rabbitmq
auth_oauth2.preferred_username_claims.1 = user_name
auth_oauth2.additional_scopes_key = extra_scope
auth_oauth2.jwks_url = https://localhost:8443/realms/test/protocol/openid-connect/certs
it fails on certificate validation when try to access keycloak URL.
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Disabling peer verification for JWKS servers sounds like an awful idea. Perhaps consider making the self-signed certificate trusted on the RabbitMQ hosts. |
Beta Was this translation helpful? Give feedback.
econnrefused
does not necessarily mean that a peer certificate chain verification was involved. There isn't enough information to conclude much.Disabling peer verification for JWKS servers sounds like an awful idea. Perhaps consider making the self-signed certificate trusted on the RabbitMQ hosts.