File tree Expand file tree Collapse file tree 3 files changed +5
-9
lines changed Expand file tree Collapse file tree 3 files changed +5
-9
lines changed Original file line number Diff line number Diff line change @@ -5,8 +5,6 @@ log.console.level = debug
5
5
management.oauth_enabled = true
6
6
management.oauth_client_id = {Client ID}
7
7
management.oauth_scopes = openid profile rabbitmq.tag:administrator
8
- management.oauth_authorization_endpoint_params.audience = rabbitmq
9
- management.oauth_token_endpoint_params.audience = rabbitmq
10
8
11
9
auth_oauth2.resource_server_id = rabbitmq
12
10
auth_oauth2.issuer = {Domain}
Original file line number Diff line number Diff line change @@ -8,9 +8,7 @@ management.oauth_scopes = openid profile api://{Application(client) ID}/rabbitmq
8
8
9
9
auth_oauth2.resource_server_id = {Application(client) ID}
10
10
auth_oauth2.additional_scopes_key = roles
11
- auth_oauth2.issuer = https://login.microsoftonline.com/{Directory (tenant) ID}/v2.0
12
- #include the following line if your app has a custom signing key
13
- #auth_oauth2.discovery_endpoint_params.appid = {Application(client) ID}
11
+ auth_oauth2.jwks_url = https://login.microsoftonline.com/{Directory (tenant) ID}/discovery/v2.0/keys
14
12
auth_oauth2.preferred_username_claims.1 = name
15
13
auth_oauth2.preferred_username_claims.2 = preferred_username
16
14
Original file line number Diff line number Diff line change @@ -3,17 +3,17 @@ auth_backends.1 = rabbit_auth_backend_oauth2
3
3
management.oauth_enabled = true
4
4
management.oauth_client_id = {okta_client_app_ID}
5
5
management.oauth_scopes = admin monitoring
6
+ management.oauth_metadata_url = {okta-domain-name}/oauth2/default/.well-known/oauth-authorization-server
7
+ management.oauth_provider_url = {okta-domain-name}/oauth2/default
6
8
7
9
auth_oauth2.resource_server_id = {okta_client_app_ID}
8
- auth_oauth2.issuer = {okta-domain-name}/oauth2/default
9
- #Okta supports two openid discovery endpoints. The standard and .well-known/oauth-authorization-server
10
- #Comment out this following line if the standard path does not work
11
- #auth_oauth2.discovery_endpoint_path = .well-known/oauth-authorization-server
10
+ auth_oauth2.jwks_url = {okta-domain-name}/oauth2/default/v1/keys
12
11
auth_oauth2.additional_scopes_key = role
13
12
auth_oauth2.verify_aud = false
14
13
auth_oauth2.scope_prefix = okta.
15
14
auth_oauth2.https.hostname_verification = wildcard
16
15
16
+
17
17
management.ssl.port = 15671
18
18
management.ssl.cacertfile = /conf/certs/cacert.pem
19
19
management.ssl.certfile = /conf/certs/cert.pem
You can’t perform that action at this time.
0 commit comments