mirror of
https://github.com/keycloak/keycloak.git
synced 2026-01-09 23:12:06 -03:30
ExternalLinks are broken in documentation
Closes #41491 Signed-off-by: Martin Bartoš <mabartos@redhat.com>
This commit is contained in:
parent
58b69351be
commit
55cd851ecc
@ -6,8 +6,8 @@ Keycloak server was upgraded to use Wildfly 25.0.1.Final as the underlying conta
|
||||
|
||||
WildFly 25 drops support for the legacy security subsystem, which is being replaced fully by Elytron. This requires significant changes to how Keycloak is configured. Please, refer to the migration guide for more details.
|
||||
|
||||
For more information on WildFly 25 refer to the https://www.wildfly.org/news/2021/10/05/WildFly25-Final-Released/[WildFly 25 release notes].
|
||||
For more information on WildFly 25 refer to the https://www.wildfly.org/news/2021/10/05/WildFly-25-is-released/[WildFly 25 release notes].
|
||||
|
||||
== Upgrade to Quarkus 2.5.3
|
||||
|
||||
Keycloak.X Quarkus preview distribution was upgraded to Quarkus 2.5.3.
|
||||
Keycloak.X Quarkus preview distribution was upgraded to Quarkus 2.5.3.
|
||||
|
||||
@ -4,4 +4,4 @@
|
||||
|
||||
Keycloak server was upgraded to use Wildfly 26.0.0.Final as the underlying container.
|
||||
|
||||
For more information on WildFly 26 refer to the https://www.wildfly.org/news/2021/12/16/WildFly26-Final-Released/[WildFly 26 release notes].
|
||||
For more information on WildFly 26 refer to the https://www.wildfly.org/news/2021/12/16/WildFly-26-is-released/[WildFly 26 release notes].
|
||||
|
||||
@ -1,5 +1,5 @@
|
||||
[[_recovery-codes]]
|
||||
|
||||
[[_recovery-codes]]
|
||||
=== Recovery Codes
|
||||
|
||||
The Recovery Codes are a number of sequential one-time passwords (currently 12) auto-generated by {project_name}. The codes can be used as a 2nd Factor Authentication (2FA) by adding the `Recovery Authentication Code Form` authenticator to your authentication flow. When configured in the flow, {project_name} asks the user for the next generated code in order. When the current code is introduced by the user, it is removed and the next code will be required for the next login.
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
[role="_abstract"]
|
||||
link:https://openid.net/developers/how-connect-works/[OpenID Connect] (OIDC) is an authentication protocol that is an extension of link:https://datatracker.ietf.org/doc/html/rfc6749[OAuth 2.0].
|
||||
|
||||
OAuth 2.0 is a framework for building authorization protocols and is incomplete. OIDC, however, is a full authentication and authorization protocol that uses the link:https://jwt.io[Json Web Token] (JWT) standards. The JWT standards define an identity token JSON format and methods to digitally sign and encrypt data in a compact and web-friendly way.
|
||||
OAuth 2.0 is a framework for building authorization protocols and is incomplete. OIDC, however, is a full authentication and authorization protocol that uses the link:https://www.jwt.io/[Json Web Token] (JWT) standards. The JWT standards define an identity token JSON format and methods to digitally sign and encrypt data in a compact and web-friendly way.
|
||||
|
||||
In general, OIDC implements two use cases. The first case is an application requesting that a {project_name} server authenticates a user. Upon successful login, the application receives an _identity token_ and an _access token_.
|
||||
The _identity token_ contains user information including user name, email, and profile information. The realm digitally signs the _access token_ which contains access information (such as user role mappings) that applications use to determine the resources users can access in the application.
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
|
||||
link:https://openid.net/developers/how-connect-works/[OpenID Connect] (OIDC) is an authentication protocol that is an extension of link:https://datatracker.ietf.org/doc/html/rfc6749[OAuth 2.0].
|
||||
While OAuth 2.0 is only a framework for building authorization protocols and is mainly incomplete, OIDC is a full-fledged authentication and authorization
|
||||
protocol. OIDC also makes heavy use of the link:https://jwt.io[Json Web Token] (JWT) set of standards. These standards define an
|
||||
protocol. OIDC also makes heavy use of the link:https://www.jwt.io/[Json Web Token] (JWT) set of standards. These standards define an
|
||||
identity token JSON format and ways to digitally sign and encrypt that data in a compact and web-friendly way.
|
||||
|
||||
There are really two types of use cases when using OIDC. The first is an application that asks the {project_name} server to authenticate
|
||||
|
||||
@ -12,7 +12,7 @@ We are really sorry for this inconvenience and understand this will make it sign
|
||||
|
||||
One thing worth pointing out is the switch to Quarkus distribution, which we plan to make fully supported in Keycloak 17, will make it significantly easier to configure and upgrade Keycloak.
|
||||
|
||||
For more information on WildFly 25 refer to the https://www.wildfly.org/news/2021/10/05/WildFly25-Final-Released/[WildFly 25 release notes].
|
||||
For more information on WildFly 25 refer to the https://www.wildfly.org/news/2021/10/05/WildFly-25-is-released/[WildFly 25 release notes].
|
||||
|
||||
= Proxy environment variables
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user