Skip to content

Commit 710ac08

Browse files
Use settings available in 4.0
1 parent 4776121 commit 710ac08

File tree

3 files changed

+5
-9
lines changed

3 files changed

+5
-9
lines changed

conf/auth0/rabbitmq.conf.tmpl

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,6 @@ log.console.level = debug
55
management.oauth_enabled = true
66
management.oauth_client_id = {Client ID}
77
management.oauth_scopes = openid profile rabbitmq.tag:administrator
8-
management.oauth_authorization_endpoint_params.audience = rabbitmq
9-
management.oauth_token_endpoint_params.audience = rabbitmq
108

119
auth_oauth2.resource_server_id = rabbitmq
1210
auth_oauth2.issuer = {Domain}

conf/entra/rabbitmq.conf.tmpl

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,7 @@ management.oauth_scopes = openid profile api://{Application(client) ID}/rabbitmq
88

99
auth_oauth2.resource_server_id = {Application(client) ID}
1010
auth_oauth2.additional_scopes_key = roles
11-
auth_oauth2.issuer = https://login.microsoftonline.com/{Directory (tenant) ID}/v2.0
12-
#include the following line if your app has a custom signing key
13-
#auth_oauth2.discovery_endpoint_params.appid = {Application(client) ID}
11+
auth_oauth2.jwks_url = https://login.microsoftonline.com/{Directory (tenant) ID}/discovery/v2.0/keys
1412
auth_oauth2.preferred_username_claims.1 = name
1513
auth_oauth2.preferred_username_claims.2 = preferred_username
1614

conf/okta/rabbitmq.conf.tmpl

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,17 @@ auth_backends.1 = rabbit_auth_backend_oauth2
33
management.oauth_enabled = true
44
management.oauth_client_id = {okta_client_app_ID}
55
management.oauth_scopes = admin monitoring
6+
management.oauth_metadata_url = {okta-domain-name}/oauth2/default/.well-known/oauth-authorization-server
7+
management.oauth_provider_url = {okta-domain-name}/oauth2/default
68

79
auth_oauth2.resource_server_id = {okta_client_app_ID}
8-
auth_oauth2.issuer = {okta-domain-name}/oauth2/default
9-
#Okta supports two openid discovery endpoints. The standard and .well-known/oauth-authorization-server
10-
#Comment out this following line if the standard path does not work
11-
#auth_oauth2.discovery_endpoint_path = .well-known/oauth-authorization-server
10+
auth_oauth2.jwks_url = {okta-domain-name}/oauth2/default/v1/keys
1211
auth_oauth2.additional_scopes_key = role
1312
auth_oauth2.verify_aud = false
1413
auth_oauth2.scope_prefix = okta.
1514
auth_oauth2.https.hostname_verification = wildcard
1615

16+
1717
management.ssl.port = 15671
1818
management.ssl.cacertfile = /conf/certs/cacert.pem
1919
management.ssl.certfile = /conf/certs/cert.pem

0 commit comments

Comments
 (0)