You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: site/oauth2-examples.md
+9-10
Original file line number
Diff line number
Diff line change
@@ -80,11 +80,10 @@ has to be configured to validate any of the two types of digital signatures.
80
80
Given that asymmetrical keys is the most widely used option, you are going to focus on how to
81
81
configure RabbitMQ with them.
82
82
83
-
Run the following 3 commands to get the environment ready to see Oauth 2.0 plugin in action:
83
+
Run the following 2 commands to get the environment ready to see Oauth 2.0 plugin in action:
84
84
85
85
1.`make start-uaa` to get UAA server running
86
-
2.`make setup-uaa-users-and-clients` to install uaac client; connect to UAA server and set ups users, group, clients and permissions
87
-
3.`make start-rabbitmq` to start RabbitMQ server
86
+
2.`make start-rabbitmq` to start RabbitMQ server
88
87
89
88
The last command starts a RabbitMQ server with [this](https://github.com/rabbitmq/rabbitmq-oauth2-tutorial/blob/main/conf/uaa/rabbitmq.config) configuration file.
90
89
@@ -132,7 +131,6 @@ To configure the RabbitMQ Management UI with OAuth 2.0, the following configurat
132
131
{rabbitmq_management, [
133
132
{oauth_enabled, true},
134
133
{oauth_client_id, "rabbit_client_code"},
135
-
{oauth_client_secret, "rabbit_client_code"},
136
134
{oauth_provider_url, "http://localhost:8080"},
137
135
...
138
136
]},
@@ -144,14 +142,14 @@ When RabbitMQ is provided as a service from a web portal, it is easy to navigate
144
142
with a single click. The web portal retrieves a token before taking the user to the RabbitMQ Management UI web page.
How it works, firstly, the `rabbit_admin` user navigates to the web portal and clicks on the hyperlink associated with a RabbitMQ
154
-
cluster. Next, the web portal obtains a token and redirects the user to RabbitMQ. Finally,
152
+
cluster. Next, the web portal obtains a token and redirects the user to RabbitMQ`/login` endpoint with the token within the HTTP form field `access_token`. Finally,
155
153
RabbitMQ validates the token in the http request and if it is valid, it redirects the user to the overview page.
156
154
157
155
By default, the RabbitMQ Management UI is configured with **service-provider initiated logon**, to configure **Identity-Provider initiated logon**, add one entry to the configuration. An example is provided here:
@@ -161,7 +159,6 @@ By default, the RabbitMQ Management UI is configured with **service-provider ini
161
159
{rabbitmq_management, [
162
160
{oauth_enabled, true},
163
161
{oauth_client_id, "rabbit_client_code"},
164
-
{oauth_client_secret, "rabbit_client_code"},
165
162
{oauth_provider_url, "http://localhost:8080"},
166
163
{oauth_initiated_logon_type, idp_initiated},
167
164
...
@@ -199,7 +196,7 @@ to the RabbitMQ management endpoint passing the JWT token within the `Authorizat
199
196
The following command launches the browser with `mgt_api_client` client with a JWT token previously obtained from UAA:
200
197
201
198
<preclass="lang-bash">
202
-
make curl url=http://localhost:15672/api/overview client_id=mgt_api_client secret=mgt_api_client
199
+
make curl-uaa url=http://localhost:15672/api/overview client_id=mgt_api_client secret=mgt_api_client
203
200
</pre>
204
201
205
202
@@ -739,12 +736,14 @@ The following configuration snippets demonstrate these steps:
0 commit comments