0% found this document useful (0 votes)
58 views

Configuration Auth-Gateway

This document contains configuration settings for an auth-service and gateway-service. The auth-service configures JWT and OAuth2 security, including key aliases and passwords. It also sets the user name and password for a test user. The gateway-service configures OAuth2 client registration with the auth-service for authorization and token endpoints, and references the auth-service for JWT key settings.

Uploaded by

ippili
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Configuration Auth-Gateway

This document contains configuration settings for an auth-service and gateway-service. The auth-service configures JWT and OAuth2 security, including key aliases and passwords. It also sets the user name and password for a test user. The gateway-service configures OAuth2 client registration with the auth-service for authorization and token endpoints, and references the auth-service for JWT key settings.

Uploaded by

ippili
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Auth-service configuration

==========================
security:
jwt:
key-pair-alias: mworx-jwt-kp
key-pair-password: mworx-jwt-kp-pwd
key-store: classpath:/mworx-jwt-ks.jks
key-store-password: mworx-jwt-ks-pwd
oauth2:
client:
client-id: mworx-client
client-redirect-url: http://localhost:8080/login/oauth2/code/mworx
client-resource-ids: api
client-scopes: all
client-secret: '{noop}mworxoauthpwd'
resourceserver:
jwt:
jwk-set-uri: ${spring.security.oauth2.resourceserver.jwt.jwk-set-
uri}
resource:
jwk:
key-set-uri: ${security.oauth2.client.resourceserver.jwt.jwk-set-uri}
server:
enabled: true
spring:
application:
name: auth-service
jackson:
serialization:
WRITE_DATES_AS_TIMESTAMPS: false
mapper:
ALLOW_COERCION_OF_SCALARS: true
liquibase:
change-log: classpath:/db/changelog/db.changelog-master.xml
default-schema: auth
enabled: true
liquibase-schema: auth
resources:
static-locations:
classpath:/js/,classpath:/css/,classpath:/images/,classpath:/json/,classpath:/META-
INF/resources/webjars/,classpath:/META-INF/resources/
security:
oauth2:
resourceserver:
jwt:
jwk-set-uri: http://localhost:8082/auth/oauth/keys
user:
authorities: ALL
id: 100
name: malocaluser
password: password
Gateway-service

security:
oauth2:
client:
registration:
mworx:
provider: mworx
client-id: mworx-client
client-secret: mworxoauthpwd
authorization-grant-type: authorization_code
redirect-uri: '{baseUrl}/{action}/oauth2/code/{registrationId}'
scope: all
provider:
mworx:
authorization-uri: http://localhost:8082/auth/oauth/authorize
token-uri: http://localhost:8082/auth/oauth/token
user-info-uri: http://localhost:8082/auth/api/oauth/userinfo
user-name-attribute: sub
jwk-set-uri: http://localhost:8082/auth/oauth/keys
resourceserver:
jwt:
jwk-set-uri: http://localhost:8082/auth/oauth/keys

You might also like