Replies: 3 comments 7 replies
-
|
Hi @alexisph, no, client applications don't need to know anything about the |
Beta Was this translation helpful? Give feedback.
-
|
Hi @carlesarnal, Thanks for the reply. Just to make sure I got this right, is it really a best practice for the apps to provide both sets of credentials to the service registry? I would like to avoid storing credentials outside of AD, if at all possible. Thanks, |
Beta Was this translation helpful? Give feedback.
-
|
I think I've found a secure solution for this issue. I've been studying the authentication protocols (ref1, ref2) in which a client doing machine-to-machine interaction should use the Client Credentials flow. In summary:
In this way, an actual person can login with their AD credentials and an app/service/machine can request a token with their OIDC client credentials. It seems there is no way to keep all credentials in AD. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi all,
What are the current best practices on connecting to the registry, with respect to client authentication?
I've been reading Red Hat's docs which describe the creation of two OIDC clients: 1)
registry-apiwithbearer-onlyaccess type and 2)apicurio-registrywithpublicaccess type.In my setup, I have created these two OIDC clients in Keycloak and have also configured LDAP federation for the user database. What does the above configuration mean to applications that want to call Apicurio's API? Do they need to know the
registry-apiclient ID?Also, as a best practice, should each application which will call Apicurio's API use the same
registry-apiclient_id, or should they have their ownclient_idandclient_secret?Many thanks,
Alexander
Beta Was this translation helpful? Give feedback.
All reactions