From ee60c5a3b956556514b21a5a8650d4e77f82abfd Mon Sep 17 00:00:00 2001 From: Sergio del Amo Date: Tue, 12 Dec 2023 15:39:59 +0100 Subject: [PATCH] split docs (#1533) --- src/main/docs/guide/authenticationProviders.adoc | 6 ------ .../authenticationProvidersUseCases.adoc | 3 +++ .../builtInAuthenticationProviders.adoc | 1 + src/main/docs/guide/toc.yml | 5 ++++- 4 files changed, 8 insertions(+), 7 deletions(-) create mode 100644 src/main/docs/guide/authenticationProviders/authenticationProvidersUseCases.adoc create mode 100644 src/main/docs/guide/authenticationProviders/builtInAuthenticationProviders.adoc diff --git a/src/main/docs/guide/authenticationProviders.adoc b/src/main/docs/guide/authenticationProviders.adoc index 7832e892c1..d3d3f94387 100644 --- a/src/main/docs/guide/authenticationProviders.adoc +++ b/src/main/docs/guide/authenticationProviders.adoc @@ -6,9 +6,3 @@ The following code snippet illustrates a naive implementation: ---- include::{testssecurity}/security/token/basicauth/AuthenticationProviderUserPassword.java[tag=clazz,indent=0] ---- - -The built-in <> uses every available authentication provider. The first provider that returns a successful authentication response will have its value used as the basis for the JWT token or session state. - -Basic authentication which is implemented as an api:security.filters.AuthenticationFetcher[] will also trigger the available api:security.authentication.AuthenticationProvider[]s. - -Micronaut comes with authentication providers for LDAP and the OAuth 2.0 password grant authentication flow. For any custom authentication, an authentication provider must be created. diff --git a/src/main/docs/guide/authenticationProviders/authenticationProvidersUseCases.adoc b/src/main/docs/guide/authenticationProviders/authenticationProvidersUseCases.adoc new file mode 100644 index 0000000000..b95982e9b9 --- /dev/null +++ b/src/main/docs/guide/authenticationProviders/authenticationProvidersUseCases.adoc @@ -0,0 +1,3 @@ +The built-in <> uses every available authentication provider. The first provider that returns a successful authentication response will have its value used as the basis for the JWT token or session state. + +Basic authentication which is implemented as an api:security.filters.AuthenticationFetcher[] will also trigger the available api:security.authentication.AuthenticationProvider[]s. diff --git a/src/main/docs/guide/authenticationProviders/builtInAuthenticationProviders.adoc b/src/main/docs/guide/authenticationProviders/builtInAuthenticationProviders.adoc new file mode 100644 index 0000000000..c0b01937c3 --- /dev/null +++ b/src/main/docs/guide/authenticationProviders/builtInAuthenticationProviders.adoc @@ -0,0 +1 @@ +Micronaut comes with authentication providers for LDAP (api:security.ldap.LdapAuthenticationProvider[]) and the OAuth 2.0 password grant authentication flow (api:security.oauth2.endpoint.token.request.password.OauthPasswordAuthenticationProvider[] and api:security.oauth2.endpoint.token.request.password.OpenIdPasswordAuthenticationProvider[]). For any custom authentication, an authentication provider must be created. diff --git a/src/main/docs/guide/toc.yml b/src/main/docs/guide/toc.yml index 3a937ad6f0..0b7544a4c0 100644 --- a/src/main/docs/guide/toc.yml +++ b/src/main/docs/guide/toc.yml @@ -14,7 +14,10 @@ securityConfiguration: logoutHandler: Logout Handler noRedirection: Handlers without redirection redirection: Redirection Configuration -authenticationProviders: Authentication Providers +authenticationProviders: + title: Authentication Providers + authenticationProvidersUseCases: Authentication Providers Use Cases + builtInAuthenticationProviders: Built-In Authentication Providers securityRule: title: Security Rules ipPattern: IP Pattern Rule