From f66359ce197946ce9932a8aa08b175f3ba4954de Mon Sep 17 00:00:00 2001 From: Steven Hawkins Date: Tue, 14 Oct 2025 05:02:20 -0400 Subject: [PATCH] fix: updating service account docs closes: #17268 Signed-off-by: Steve Hawkins Signed-off-by: Steven Hawkins Co-authored-by: Alexander Schwartz --- .../server_development/topics/admin-rest-api.adoc | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/docs/documentation/server_development/topics/admin-rest-api.adoc b/docs/documentation/server_development/topics/admin-rest-api.adoc index 69e095b0e65..0b1f02fda00 100644 --- a/docs/documentation/server_development/topics/admin-rest-api.adoc +++ b/docs/documentation/server_development/topics/admin-rest-api.adoc @@ -51,12 +51,12 @@ To authenticate against the Admin REST API using a `client_id` and a `client_sec . Make sure the client is configured as follows: -* `client_id` is a **confidential** client that belongs to the realm *master* -* `client_id` has `Service Accounts Enabled` option enabled -* `client_id` has a custom "Audience" mapper - ** Included Client Audience: `security-admin-console` +* `client_id` belongs to the realm *master* +* `client_id` has *Client authentication* set to *On* +* `client_id` has the *Service account roles* option enabled +* Assign `client_id` the `admin` realm role in the *Service accounts roles* tab. -. Check that `client_id` has the role 'admin' assigned in the "Service Account Roles" tab. +. Use the *Client Secret* from the *Credentials* tab to verify the service account access: [source,bash,subs="attributes+"] ----