Skip to content
This repository was archived by the owner on Jul 10, 2024. It is now read-only.
This repository was archived by the owner on Jul 10, 2024. It is now read-only.

How to use OIDC classes  #1034

@mousumi16

Description

@mousumi16

@cdmikechen
Please give a sample code on how to use the newly added OIDC feature in apache submarine.
claimsMap.put("jti", sysUser.getId());
// TODO(cdmikechen) By default the simple token is used,
// in other cases such as ldap it may need to be returned as an interface
String token = SimpleLoginConfig.getJwtGenerator().generate(claimsMap);

    sysUser.setToken(token);

the above code comment is added with OIDC feature. What does this mean and how the OIDC login is going to work?
where to provide the client id n secret details to connect to Keycloak ?

Please guide on this.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions