You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/oauth2-examples-auth0.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,19 +21,18 @@ limitations under the License.
21
21
22
22
# Use https://auth0.com/ as OAuth 2.0 server
23
23
24
-
Demonstrate how to authenticate using the OAuth 2.0 protocol
24
+
This guide explains how to set up OAuth 2.0 for RabbitMQ
25
25
and Auth0 as Authorization Server using the following flows:
26
26
27
-
* Access management UI via a browser
27
+
* Access [management UI](./management/) via a browser
28
28
* Access management rest api
29
-
*Access AMQP protocol
29
+
*Application authentication and authorization
30
30
31
31
## Prerequisites to follow this guide
32
32
33
33
* Have an account in https://auth0.com/.
34
34
* Docker
35
-
*`git clone https://github.com/rabbitmq/rabbitmq-oauth2-tutorial`. This github repository
36
-
contains all the configuration files and scripts used on this example.
35
+
* A local clone of a [GitHub repository](https://github.com/rabbitmq/rabbitmq-oauth2-tutorial) that contains all the configuration files and scripts used on this example
Copy file name to clipboardExpand all lines: docs/oauth2-examples-entra-id/index.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ limitations under the License.
21
21
22
22
# Use Microsoft Entra ID (formerly known as Microsoft Azure AD) as OAuth 2.0 server
23
23
24
-
Demonstrate how to authenticate using the OAuth 2.0 protocol
24
+
This guide explains how to set up OAuth 2.0 for RabbitMQ
25
25
and Microsoft Entra ID as Authorization Server using the following flows:
26
26
27
27
* Access the management UI via a browser
@@ -31,8 +31,7 @@ and Microsoft Entra ID as Authorization Server using the following flows:
31
31
* Have an account in https://portal.azure.com.
32
32
* Docker
33
33
* Openssl
34
-
*`git clone https://github.com/rabbitmq/rabbitmq-oauth2-tutorial`. This github repository
35
-
contains all the configuration files and scripts used on this example.
34
+
* A local clone of a [GitHub repository](https://github.com/rabbitmq/rabbitmq-oauth2-tutorial) that contains all the configuration files and scripts used on this example
36
35
37
36
## Register your app
38
37
@@ -214,7 +213,7 @@ on port `15671`, see the management UI guide.
214
213
215
214
:::
216
215
217
-
When you run `make start-rabbitmq` for the first time with `MODE=entra`, before RabbitMQ is deployed, a TLS certificate is generated for RabbitMQ so that it listens on HTTPS port 15671.
216
+
When you run `make start-rabbitmq` for the first time with `MODE=entra`, before RabbitMQ is deployed, a TLS certificate is generated for RabbitMQ so that it listens on HTTPS port 15671.
218
217
219
218
The script generates the following files in `conf/entra/certs`:
220
219
***cacert.pem**: a custom certificate authority that is used to generate and sign a self signed certificate for RabbitMQ
Copy file name to clipboardExpand all lines: docs/oauth2-examples-keycloak.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,19 +21,18 @@ limitations under the License.
21
21
22
22
# Use Keycloak as OAuth 2.0 server
23
23
24
-
Demonstrate how to authenticate using the OAuth 2.0 protocol
24
+
This guide explains how to set up OAuth 2.0 for RabbitMQ
25
25
and Keycloak as Authorization Server using the following flows:
26
26
27
-
* Access management UI via a browser
27
+
* Access [management UI](./management/) via a browser
28
28
* Access management rest api
29
-
*Access AMQP protocol
29
+
*Application authentication and authorization
30
30
31
31
## Prerequisites to follow this guide
32
32
33
33
* Docker
34
34
* make
35
-
*`git clone https://github.com/rabbitmq/rabbitmq-oauth2-tutorial`. This github repository
36
-
contains all the configuration files and scripts used on this example.
35
+
* A local clone of a [GitHub repository](https://github.com/rabbitmq/rabbitmq-oauth2-tutorial) that contains all the configuration files and scripts used on this example
37
36
38
37
## Deploy Keycloak
39
38
@@ -69,7 +68,7 @@ To access the management api run the following command. It uses the client [mgt_
69
68
make curl-keycloak url=http://localhost:15672/api/overview client_id=mgt_api_client secret=LWOuYqJ8gjKg3D2U8CJZDuID3KiRZVDa
70
69
```
71
70
72
-
## Access AMQP protocol with PerfTest
71
+
## Application authentication and authorization with PerfTest
73
72
74
73
To test OAuth 2.0 authentication with AMQP protocol you are going to use RabbitMQ PerfTest tool which uses RabbitMQ Java Client.
75
74
@@ -81,7 +80,7 @@ make start-perftest-producer-with-token PRODUCER=producer TOKEN=$(bin/keycloak/t
81
80
82
81
**NOTE**: Initializing an application with a token has one drawback: the application cannot use the connection beyond the lifespan of the token. See the next section where you demonstrate how to refresh the token.
83
82
84
-
## Access AMQP protocol with Pika
83
+
## Application authentication and authorization with Pika
85
84
86
85
In the following information, OAuth 2.0 authentication is tested with the AMQP protocol and the Pika library. These tests specifically demonstrate how to refresh a token on a live AMQP connection.
0 commit comments