Create a
Create a client
-A client in RHBK serves as a consumer. Since we are employing an OpenID Connect flow, the selection of a standard or implicit flow depends on whether we are configuring a private or public client.
+A client in Red Hat Build for Keycloak serves as a consumer. Since we are employing an OpenID Connect flow, the selection of a standard or implicit flow depends on whether we are configuring a private or public client.
To register a new client, navigate to the Keycloak admin console and access the client options. In this section, locate the "Create client" option.
@@ -218,7 +218,7 @@ <
-RHBK configuration
+Red Hat Build for Keycloak configuration
The Keycloak instance includes a realm that has been configured with a dedicated client tailored for this workshop.
@@ -226,7 +226,7 @@ R
This application functions as a backend service utilizing a standard flow with a private client. In the upcoming section, you will find all the necessary configurations.
-If you want to review the OpenID Connect client configuration and explore the RHBK admin console, please navigate to the following section.
+If you want to review the OpenID Connect client configuration and explore the Red Hat Build for Keycloak admin console, please navigate to the following section.
@@ -237,7 +237,7 @@ R
Quarkus configuration
-Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with RHBK, since it follows the OpenID Connect protocol, we will utilize the quarkus-oidc
generic library.
+Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with Red Hat Build for Keycloak, since it follows the OpenID Connect protocol, we will utilize the quarkus-oidc
generic library.
Create a client
A client in RHBK serves as a consumer. Since we are employing an OpenID Connect flow, the selection of a standard or implicit flow depends on whether we are configuring a private or public client.
+A client in Red Hat Build for Keycloak serves as a consumer. Since we are employing an OpenID Connect flow, the selection of a standard or implicit flow depends on whether we are configuring a private or public client.
To register a new client, navigate to the Keycloak admin console and access the client options. In this section, locate the "Create client" option.
@@ -218,7 +218,7 @@<
RHBK configuration
+Red Hat Build for Keycloak configuration
The Keycloak instance includes a realm that has been configured with a dedicated client tailored for this workshop.
R
This application functions as a backend service utilizing a standard flow with a private client. In the upcoming section, you will find all the necessary configurations.
If you want to review the OpenID Connect client configuration and explore the RHBK admin console, please navigate to the following section.
+If you want to review the OpenID Connect client configuration and explore the Red Hat Build for Keycloak admin console, please navigate to the following section.
R
Quarkus configuration
-Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with RHBK, since it follows the OpenID Connect protocol, we will utilize the quarkus-oidc
generic library.
+Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with Red Hat Build for Keycloak, since it follows the OpenID Connect protocol, we will utilize the quarkus-oidc
generic library.
Quarkus configuration
Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with RHBK, since it follows the OpenID Connect protocol, we will utilize the quarkus-oidc
generic library.
Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with Red Hat Build for Keycloak, since it follows the OpenID Connect protocol, we will utilize the quarkus-oidc
generic library.