Replies: 3 comments 7 replies
-
Hi @alexisph, no, client applications don't need to know anything about the |
Beta Was this translation helpful? Give feedback.
-
Hi @carlesarnal, Thanks for the reply. Just to make sure I got this right, is it really a best practice for the apps to provide both sets of credentials to the service registry? I would like to avoid storing credentials outside of AD, if at all possible. Thanks, |
Beta Was this translation helpful? Give feedback.
-
I think I've found a secure solution for this issue. I've been studying the authentication protocols (ref1, ref2) in which a client doing machine-to-machine interaction should use the Client Credentials flow. In summary:
In this way, an actual person can login with their AD credentials and an app/service/machine can request a token with their OIDC client credentials. It seems there is no way to keep all credentials in AD. |
Beta Was this translation helpful? Give feedback.
-
Hi all,
What are the current best practices on connecting to the registry, with respect to client authentication?
I've been reading Red Hat's docs which describe the creation of two OIDC clients: 1)
registry-api
withbearer-only
access type and 2)apicurio-registry
withpublic
access type.In my setup, I have created these two OIDC clients in Keycloak and have also configured LDAP federation for the user database. What does the above configuration mean to applications that want to call Apicurio's API? Do they need to know the
registry-api
client ID?Also, as a best practice, should each application which will call Apicurio's API use the same
registry-api
client_id, or should they have their ownclient_id
andclient_secret
?Many thanks,
Alexander
Beta Was this translation helpful? Give feedback.
All reactions