You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/modules/ROOT/partials/getting-started/proc-configuring-registry-security-azure.adoc
+7-10
Original file line number
Diff line number
Diff line change
@@ -45,13 +45,13 @@ IMPORTANT: You must register your {registry} application host as a *Redirect URI
45
45
|Environment variable
46
46
|Description
47
47
|Setting
48
-
|`QUARKUS_OIDC_CLIENT_ID`
48
+
|`QUARKUS_OIDC_CLIENT-ID`
49
49
|The client application ID for the {registry} REST API
50
50
|Your Azure AD Application (client) ID obtained in step 5. For example: `123456a7-b8c9-012d-e3f4-5fg67h8i901`
51
-
|`APICURIO_UI_AUTH_OIDC_CLIENT_ID`
51
+
|`APICURIO_UI_AUTH_OIDC_CLIENT-ID`
52
52
|The client application ID for the {registry} web console.
53
53
|Your Azure AD Application (client) ID obtained in step 5. For example: `123456a7-b8c9-012d-e3f4-5fg67h8i901`
54
-
|`QUARKUS_OIDC_AUTH_SERVER_URL`
54
+
|`QUARKUS_OIDC_AUTH-SERVER-URL`
55
55
|The URL for authentication in Azure AD.
56
56
|Your Azure AD Application (tenant) ID obtained in step 6. For example: `\https://login.microsoftonline.com/1a2bc34d-567e-89f1-g0hi-1j2kl3m4no56/v2.0`.
57
57
|===
@@ -64,22 +64,19 @@ IMPORTANT: You must register your {registry} application host as a *Redirect URI
64
64
|Environment variable
65
65
|Description
66
66
|Setting
67
-
|`QUARKUS_OIDC_TENANT_ENABLED`
67
+
|`QUARKUS_OIDC_TENANT-ENABLED`
68
68
|Enables authentication for {registry}.
69
69
|`true`
70
-
|`APICURIO_UI_AUTH_TYPE`
71
-
|The {registry} authentication type.
72
-
|`oidc`
73
70
|`QUARKUS_HTTP_CORS_ORIGINS`
74
71
|The host for your {registry} deployment for cross-origin resource sharing (CORS).
75
72
|For example: `\https://test-registry.com`
76
-
|`APICURIO_UI_AUTH_OIDC_REDIRECT_URI`
73
+
|`APICURIO_UI_AUTH_OIDC_REDIRECT-URI`
77
74
|The host for your {registry} web console.
78
75
|For example: `\https://test-registry.com/ui`
79
-
|`APICURIO_AUTH_ROLE_BASED_AUTHORIZATION`
76
+
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
80
77
|Enables role-based authorization in {registry}.
81
78
|`true`
82
-
|`QUARKUS_OIDC_ROLES_ROLE_CLAIM_PATH`
79
+
|`QUARKUS_OIDC_ROLES_ROLE-CLAIM-PATH`
83
80
|The name of the claim in which Azure AD stores roles.
Copy file name to clipboardexpand all lines: docs/modules/ROOT/partials/getting-started/ref-registry-config-migration.adoc
+2-2
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@
4
4
{registry} v3 has simplified the configuration options, removing duplicates and improving consistency.
5
5
For most options, the only change is ssrenaming of the prefix from `registry` to `apicurio`, for example, changing `registry.kafkasql.bootstrap.servers` to `apicurio.kafkasql.bootstrap.servers`.
6
6
7
-
NOTE: For each configuration property you can override the value by using the corresponding environment variable, for example, `APICURIO_KAFKA_SQL_BOOTSTRAP_SERVERS`.s
7
+
NOTE: For each configuration property you can override the value by using the corresponding environment variable, for example, `APICURIO_KAFKASQL_BOOTSTRAP_SERVERS`.s
8
8
9
9
== api
10
10
.api configuration options
@@ -282,4 +282,4 @@ NOTE: For each configuration property you can override the value by using the co
@@ -127,11 +127,11 @@ You can set the following options to `true` to enable role-based authorization i
127
127
|Java system property
128
128
|Type
129
129
|Default value
130
-
|`QUARKUS_OIDC_TENANT_ENABLED`
131
-
|`apicurio.auth.enabled`
130
+
|`QUARKUS_OIDC_TENANT-ENABLED`
131
+
|`quarkus.oidc.tenant-enabled`
132
132
|Boolean
133
133
|`false`
134
-
|`APICURIO_AUTH_ROLE_BASED_AUTHORIZATION`
134
+
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
135
135
|`apicurio.auth.role-based-authorization`
136
136
|Boolean
137
137
|`false`
@@ -152,7 +152,7 @@ To enable using roles assigned by {keycloak}, set the following environment vari
152
152
|Description
153
153
|Type
154
154
|Default
155
-
|`ROLE_BASED_AUTHZ_SOURCE`
155
+
|`APICURIO_AUTH_ROLE-SOURCE`
156
156
| When set to `token`, user roles are taken from the authentication token.
157
157
|String
158
158
|`token`
@@ -210,7 +210,7 @@ To enable using roles managed internally by {registry}, set the following enviro
210
210
|Description
211
211
|Type
212
212
|Default
213
-
|`ROLE_BASED_AUTHZ_SOURCE`
213
+
|`APICURIO_AUTH_ROLE-SOURCE`
214
214
| When set to `application`, user roles are managed internally by {registry}.
215
215
|String
216
216
|`token`
@@ -235,27 +235,27 @@ Because there are no default admin users in {registry}, it is usually helpful to
235
235
|Description
236
236
|Type
237
237
|Default
238
-
|`APICURIO_AUTH_ADMIN_OVERRIDE_ENABLED`
238
+
|`APICURIO_AUTH_ADMIN-OVERRIDE_ENABLED`
239
239
| Enables the admin-override feature.
240
240
|String
241
241
|`false`
242
-
|`APICURIO_AUTH_ADMIN_OVERRIDE_FROM`
242
+
|`APICURIO_AUTH_ADMIN-OVERRIDE_FROM`
243
243
|Where to look for admin-override information. Only `token` is currently supported.
244
244
|String
245
245
|`token`
246
-
|`APICURIO_AUTH_ADMIN_OVERRIDE_TYPE`
246
+
|`APICURIO_AUTH_ADMIN-OVERRIDE_TYPE`
247
247
|The type of information used to determine if a user is an admin. Values depend on the value of the FROM variable, for example, `role` or `claim` when FROM is `token`.
248
248
|String
249
249
|`role`
250
-
|`APICURIO_AUTH_ADMIN_OVERRIDE_ROLE`
250
+
|`APICURIO_AUTH_ADMIN-OVERRIDE_ROLE`
251
251
|The name of the role that indicates a user is an admin.
252
252
|String
253
253
|`sr-admin`
254
-
|`APICURIO_AUTH_ADMIN_OVERRIDE_CLAIM`
254
+
|`APICURIO_AUTH_ADMIN-OVERRIDE_CLAIM`
255
255
|The name of a JWT token claim to use for determining admin-override.
256
256
|String
257
257
|`org-admin`
258
-
|`APICURIO_AUTH_ADMIN_OVERRIDE_CLAIM_VALUE`
258
+
|`APICURIO_AUTH_ADMIN-OVERRIDE_CLAIM-VALUE`
259
259
|The value that the JWT token claim indicated by the CLAIM variable must be for the user to be granted admin-override.
260
260
|String
261
261
|`true`
@@ -280,16 +280,16 @@ You can set the following options to `true` to enable owner-only authorization f
0 commit comments