mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2026-02-05 20:01:57 -05:00
groupware: use the OIDC client ID 'web' instead of 'groupware'
This commit is contained in:
@@ -1,58 +0,0 @@
|
||||
{
|
||||
"clientId": "groupware",
|
||||
"name": "OpenCloud Groupware",
|
||||
"description": "Used for authenticating automated HTTP clients of the OpenCloud Groupware API",
|
||||
"rootUrl": "",
|
||||
"adminUrl": "",
|
||||
"baseUrl": "",
|
||||
"surrogateAuthRequired": false,
|
||||
"enabled": true,
|
||||
"alwaysDisplayInConsole": false,
|
||||
"clientAuthenticatorType": "client-secret",
|
||||
"redirectUris": [
|
||||
"/*"
|
||||
],
|
||||
"webOrigins": [
|
||||
"/*"
|
||||
],
|
||||
"notBefore": 0,
|
||||
"bearerOnly": false,
|
||||
"consentRequired": false,
|
||||
"standardFlowEnabled": true,
|
||||
"implicitFlowEnabled": false,
|
||||
"directAccessGrantsEnabled": true,
|
||||
"serviceAccountsEnabled": false,
|
||||
"publicClient": true,
|
||||
"frontchannelLogout": true,
|
||||
"protocol": "openid-connect",
|
||||
"attributes": {
|
||||
"oidc.ciba.grant.enabled": "false",
|
||||
"backchannel.logout.session.required": "true",
|
||||
"oauth2.device.authorization.grant.enabled": "false",
|
||||
"backchannel.logout.revoke.offline.tokens": "false"
|
||||
},
|
||||
"authenticationFlowBindingOverrides": {},
|
||||
"fullScopeAllowed": true,
|
||||
"nodeReRegistrationTimeout": -1,
|
||||
"defaultClientScopes": [
|
||||
"web-origins",
|
||||
"acr",
|
||||
"profile",
|
||||
"roles",
|
||||
"groups",
|
||||
"OpenCloudUnique_ID",
|
||||
"basic",
|
||||
"email"
|
||||
],
|
||||
"optionalClientScopes": [
|
||||
"address",
|
||||
"phone",
|
||||
"offline_access",
|
||||
"microprofile-jwt"
|
||||
],
|
||||
"access": {
|
||||
"view": true,
|
||||
"configure": true,
|
||||
"manage": true
|
||||
}
|
||||
}
|
||||
@@ -482,7 +482,7 @@ To check whether it works correctly, the following `curl` command:
|
||||
curl -ks -D- -X POST \
|
||||
"https://keycloak.opencloud.test/realms/openCloud/protocol/openid-connect/token" \
|
||||
-d username=alan -d password=demo -d grant_type=password \
|
||||
-d client_id=groupware -d scope=openid
|
||||
-d client_id=web -d scope=openid
|
||||
```
|
||||
|
||||
should provide you with a JSON response that contains an `access_token` property.
|
||||
@@ -705,7 +705,7 @@ When using the “production” setup, first make sure to retrieve a JWT
|
||||
token=$(curl --silent --insecure --fail -X POST \
|
||||
"https://keycloak.opencloud.test/realms/openCloud/protocol/openid-connect/token" \
|
||||
-d username="alan" -d password="demo" \
|
||||
-d grant_type=password -d client_id="groupware" -d scope=openid \
|
||||
-d grant_type=password -d client_id=web -d scope=openid \
|
||||
| jq -r '.access_token')
|
||||
```
|
||||
|
||||
@@ -723,7 +723,7 @@ curl --insecure -s -u "alan:demo" "https://cloud.opencloud.test/groupware/"
|
||||
|
||||
> [!TIP]
|
||||
> Until everything is documented, the complete list of URI routes can be found in \
|
||||
[`$OCDIR/opencloud/services/groupware/pkg/groupware/groupware_route.go`](./pkg/groupware/groupware_route.go)
|
||||
[`$OCDIR/opencloud/services/groupware/pkg/groupware/route.go`](./pkg/groupware/route.go)
|
||||
|
||||
## Services
|
||||
|
||||
|
||||
Reference in New Issue
Block a user