You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -226,13 +226,13 @@ IMPORTANT: You must register your {registry} application host as a *Redirect URI
226
226
|Environment variable
227
227
|Description
228
228
|Setting
229
-
|`QUARKUS_OIDC_CLIENT-ID`
229
+
|`QUARKUS_OIDC_CLIENT_ID`
230
230
|The client application ID for the {registry} REST API
231
231
|Your Azure AD Application (client) ID obtained in step 5. For example: `123456a7-b8c9-012d-e3f4-5fg67h8i901`
232
-
|`APICURIO_UI_AUTH_OIDC_CLIENT-ID`
232
+
|`APICURIO_UI_AUTH_OIDC_CLIENT_ID`
233
233
|The client application ID for the {registry} web console.
234
234
|Your Azure AD Application (client) ID obtained in step 5. For example: `123456a7-b8c9-012d-e3f4-5fg67h8i901`
235
-
|`QUARKUS_OIDC_AUTH-SERVER-URL`
235
+
|`QUARKUS_OIDC_AUTH_SERVER_URL`
236
236
|The URL for authentication in Azure AD.
237
237
|Your Azure AD Application (tenant) ID obtained in step 6. For example: `\https://login.microsoftonline.com/1a2bc34d-567e-89f1-g0hi-1j2kl3m4no56/v2.0`.
238
238
|===
@@ -245,19 +245,19 @@ IMPORTANT: You must register your {registry} application host as a *Redirect URI
245
245
|Environment variable
246
246
|Description
247
247
|Setting
248
-
|`QUARKUS_OIDC_TENANT-ENABLED`
248
+
|`QUARKUS_OIDC_TENANT_ENABLED`
249
249
|Enables authentication for {registry}.
250
250
|`true`
251
251
|`QUARKUS_HTTP_CORS_ORIGINS`
252
252
|The host for your {registry} deployment for cross-origin resource sharing (CORS).
253
253
|For example: `\https://test-registry.com`
254
-
|`APICURIO_UI_AUTH_OIDC_REDIRECT-URI`
254
+
|`APICURIO_UI_AUTH_OIDC_REDIRECT_URI`
255
255
|The host for your {registry} web console.
256
256
|For example: `\https://test-registry.com/ui`
257
-
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
257
+
|`APICURIO_AUTH_ROLE_BASED_AUTHORIZATION`
258
258
|Enables role-based authorization in {registry}.
259
259
|`true`
260
-
|`QUARKUS_OIDC_ROLES_ROLE-CLAIM-PATH`
260
+
|`QUARKUS_OIDC_ROLES_ROLE_CLAIM_PATH`
261
261
|The name of the claim in which Azure AD stores roles.
262
262
|`roles`
263
263
|===
@@ -329,19 +329,19 @@ You can set the following environment variables to configure authentication for
329
329
|Description
330
330
|Type
331
331
|Default
332
-
|`QUARKUS_OIDC_TENANT-ENABLED`
332
+
|`QUARKUS_OIDC_TENANT_ENABLED`
333
333
|Enables authentication for {registry}. When set to `true`, the environment variables that follow are required for authentication using {keycloak}.
334
334
|String
335
335
|`false`
336
-
|`QUARKUS_OIDC_AUTH-SERVER-URL`
336
+
|`QUARKUS_OIDC_AUTH_SERVER_URL`
337
337
|The URL of the {keycloak} authentication server. For example, `\http://localhost:8080`.
338
338
|String
339
339
|-
340
-
|`QUARKUS_OIDC_CLIENT-ID`
340
+
|`QUARKUS_OIDC_CLIENT_ID`
341
341
|The client ID for the {registry} REST API.
342
342
|String
343
343
|`registry-api`
344
-
|`APICURIO_UI_AUTH_OIDC_CLIENT-ID`
344
+
|`APICURIO_UI_AUTH_OIDC_CLIENT_ID`
345
345
|The client ID for the {registry} web console.
346
346
|String
347
347
|`apicurio-registry`
@@ -356,7 +356,7 @@ You can set the following environment variables to configure authentication for
356
356
|String
357
357
|-
358
358
359
-
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
359
+
|`APICURIO_AUTH_ROLE_BASED_AUTHORIZATION`
360
360
|Enables or disables role-based authorization.
361
361
|Boolean
362
362
|False
@@ -376,11 +376,11 @@ By default, {registry} supports authentication by using OpenID Connect. Users or
@@ -420,11 +420,11 @@ You can set the following options to `true` to enable role-based authorization i
420
420
|Java system property
421
421
|Type
422
422
|Default value
423
-
|`QUARKUS_OIDC_TENANT-ENABLED`
423
+
|`QUARKUS_OIDC_TENANT_ENABLED`
424
424
|`quarkus.oidc.tenant-enabled`
425
425
|Boolean
426
426
|`false`
427
-
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
427
+
|`APICURIO_AUTH_ROLE_BASED_AUTHORIZATION`
428
428
|`apicurio.auth.role-based-authorization`
429
429
|Boolean
430
430
|`false`
@@ -445,7 +445,7 @@ To enable using roles assigned by {keycloak}, set the following environment vari
445
445
|Description
446
446
|Type
447
447
|Default
448
-
|`APICURIO_AUTH_ROLE-SOURCE`
448
+
|`APICURIO_AUTH_ROLE_SOURCE`
449
449
| When set to `token`, user roles are taken from the authentication token.
450
450
|String
451
451
|`token`
@@ -503,7 +503,7 @@ To enable using roles managed internally by {registry}, set the following enviro
503
503
|Description
504
504
|Type
505
505
|Default
506
-
|`APICURIO_AUTH_ROLE-SOURCE`
506
+
|`APICURIO_AUTH_ROLE_SOURCE`
507
507
| When set to `application`, user roles are managed internally by {registry}.
508
508
|String
509
509
|`token`
@@ -528,27 +528,27 @@ Because there are no default admin users in {registry}, it is usually helpful to
528
528
|Description
529
529
|Type
530
530
|Default
531
-
|`APICURIO_AUTH_ADMIN-OVERRIDE_ENABLED`
531
+
|`APICURIO_AUTH_ADMIN_OVERRIDE_ENABLED`
532
532
| Enables the admin-override feature.
533
533
|String
534
534
|`false`
535
-
|`APICURIO_AUTH_ADMIN-OVERRIDE_FROM`
535
+
|`APICURIO_AUTH_ADMIN_OVERRIDE_FROM`
536
536
|Where to look for admin-override information. Only `token` is currently supported.
537
537
|String
538
538
|`token`
539
-
|`APICURIO_AUTH_ADMIN-OVERRIDE_TYPE`
539
+
|`APICURIO_AUTH_ADMIN_OVERRIDE_TYPE`
540
540
|The type of information used to determine if a user is an admin. Values depend on the value of the FROM variable, for example, `role` or `claim` when FROM is `token`.
541
541
|String
542
542
|`role`
543
-
|`APICURIO_AUTH_ADMIN-OVERRIDE_ROLE`
543
+
|`APICURIO_AUTH_ADMIN_OVERRIDE_ROLE`
544
544
|The name of the role that indicates a user is an admin.
545
545
|String
546
546
|`sr-admin`
547
-
|`APICURIO_AUTH_ADMIN-OVERRIDE_CLAIM`
547
+
|`APICURIO_AUTH_ADMIN_OVERRIDE_CLAIM`
548
548
|The name of a JWT token claim to use for determining admin-override.
549
549
|String
550
550
|`org-admin`
551
-
|`APICURIO_AUTH_ADMIN-OVERRIDE_CLAIM-VALUE`
551
+
|`APICURIO_AUTH_ADMIN_OVERRIDE_CLAIM_VALUE`
552
552
|The value that the JWT token claim indicated by the CLAIM variable must be for the user to be granted admin-override.
553
553
|String
554
554
|`true`
@@ -577,12 +577,12 @@ You can set the following options to `true` to enable owner-only authorization f
0 commit comments