diff --git a/devtools/deployments/opencloud_full/config/keycloak/clients/groupware.json b/devtools/deployments/opencloud_full/config/keycloak/clients/groupware.json deleted file mode 100644 index 775bc03ea..000000000 --- a/devtools/deployments/opencloud_full/config/keycloak/clients/groupware.json +++ /dev/null @@ -1,58 +0,0 @@ -{ - "clientId": "groupware", - "name": "OpenCloud Groupware", - "description": "Used for authenticating automated HTTP clients of the OpenCloud Groupware API", - "rootUrl": "", - "adminUrl": "", - "baseUrl": "", - "surrogateAuthRequired": false, - "enabled": true, - "alwaysDisplayInConsole": false, - "clientAuthenticatorType": "client-secret", - "redirectUris": [ - "/*" - ], - "webOrigins": [ - "/*" - ], - "notBefore": 0, - "bearerOnly": false, - "consentRequired": false, - "standardFlowEnabled": true, - "implicitFlowEnabled": false, - "directAccessGrantsEnabled": true, - "serviceAccountsEnabled": false, - "publicClient": true, - "frontchannelLogout": true, - "protocol": "openid-connect", - "attributes": { - "oidc.ciba.grant.enabled": "false", - "backchannel.logout.session.required": "true", - "oauth2.device.authorization.grant.enabled": "false", - "backchannel.logout.revoke.offline.tokens": "false" - }, - "authenticationFlowBindingOverrides": {}, - "fullScopeAllowed": true, - "nodeReRegistrationTimeout": -1, - "defaultClientScopes": [ - "web-origins", - "acr", - "profile", - "roles", - "groups", - "OpenCloudUnique_ID", - "basic", - "email" - ], - "optionalClientScopes": [ - "address", - "phone", - "offline_access", - "microprofile-jwt" - ], - "access": { - "view": true, - "configure": true, - "manage": true - } -} diff --git a/services/groupware/DEVELOPER.md b/services/groupware/DEVELOPER.md index 19e779e84..7814ce74d 100644 --- a/services/groupware/DEVELOPER.md +++ b/services/groupware/DEVELOPER.md @@ -482,7 +482,7 @@ To check whether it works correctly, the following `curl` command: curl -ks -D- -X POST \ "https://keycloak.opencloud.test/realms/openCloud/protocol/openid-connect/token" \ -d username=alan -d password=demo -d grant_type=password \ --d client_id=groupware -d scope=openid +-d client_id=web -d scope=openid ``` should provide you with a JSON response that contains an `access_token` property. @@ -705,7 +705,7 @@ When using the “production” setup, first make sure to retrieve a JWT token=$(curl --silent --insecure --fail -X POST \ "https://keycloak.opencloud.test/realms/openCloud/protocol/openid-connect/token" \ -d username="alan" -d password="demo" \ --d grant_type=password -d client_id="groupware" -d scope=openid \ +-d grant_type=password -d client_id=web -d scope=openid \ | jq -r '.access_token') ``` @@ -723,7 +723,7 @@ curl --insecure -s -u "alan:demo" "https://cloud.opencloud.test/groupware/" > [!TIP] > Until everything is documented, the complete list of URI routes can be found in \ -[`$OCDIR/opencloud/services/groupware/pkg/groupware/groupware_route.go`](./pkg/groupware/groupware_route.go) +[`$OCDIR/opencloud/services/groupware/pkg/groupware/route.go`](./pkg/groupware/route.go) ## Services