OpenID Connect (OIDC) configuration properties
As a Quarkus developer, you configure the Quarkus OpenID Connect (OIDC) extension by setting the following properties in the src/main/resources/application.properties
file.
OIDC configuration
Configuration property fixed at build time - All other configuration properties are overridable at runtime
Configuration property |
类型 |
默认 |
---|---|---|
If the OIDC extension is enabled. Environment variable: Show more |
boolean |
|
Grant type which will be used to acquire a token to test the OIDC 'service' applications Environment variable: Show more |
|
|
Grant options Environment variable: Show more |
Map<String,Map<String,String>> |
|
The WebClient timeout. Use this property to configure how long an HTTP client used by Dev UI handlers will wait for a response when requesting tokens from OpenId Connect Provider and sending them to the service endpoint. Environment variable: Show more |
|
|
Enable the registration of the Default TokenIntrospection and UserInfo Cache implementation bean. Note: This only enables the default implementation. It requires configuration to be activated. See Environment variable: Show more |
boolean |
|
The base URL of the OpenID Connect (OIDC) server, for example, Environment variable: Show more |
string |
|
Discovery of the OIDC endpoints. If not enabled, you must configure the OIDC endpoint URLs individually. Environment variable: Show more |
boolean |
|
The relative path or absolute URL of the OIDC dynamic client registration endpoint. Set if Environment variable: Show more |
string |
|
The duration to attempt the initial connection to an OIDC server. For example, setting the duration to Environment variable: Show more |
||
The number of times to retry re-establishing an existing OIDC connection if it is temporarily lost. Different from Environment variable: Show more |
int |
|
The number of seconds after which the current OIDC connection request times out. Environment variable: Show more |
|
|
Whether DNS lookup should be performed on the worker thread. Use this option when you can see logged warnings about blocked Vert.x event loop by HTTP requests to OIDC server. Environment variable: Show more |
boolean |
|
The maximum size of the connection pool used by the WebClient. Environment variable: Show more |
int |
|
The host name or IP address of the Proxy. Environment variable: Show more |
string |
|
The port number of the Proxy. The default value is Environment variable: Show more |
int |
|
The username, if the Proxy needs authentication. Environment variable: Show more |
string |
|
The password, if the Proxy needs authentication. Environment variable: Show more |
string |
|
The name of the TLS configuration to use. If a name is configured, it uses the configuration from The default TLS configuration is not used by default. Environment variable: Show more |
string |
|
The OIDC token endpoint that issues access and refresh tokens; specified as a relative path or absolute URL. Set if Environment variable: Show more |
string |
|
The relative path or absolute URL of the OIDC token revocation endpoint. Environment variable: Show more |
string |
|
The client id of the application. Each application has a client id that is used to identify the application. Setting the client id is not required if Environment variable: Show more |
string |
|
The client name of the application. It is meant to represent a human readable description of the application which you may provide when an application (client) is registered in an OpenId Connect provider’s dashboard. For example, you can set this property to have more informative log messages which record an activity of the given client. Environment variable: Show more |
string |
|
The client secret used by the Environment variable: Show more |
string |
|
The client secret value. This value is ignored if Environment variable: Show more |
string |
|
The CredentialsProvider bean name, which should only be set if more than one CredentialsProvider is registered Environment variable: Show more |
string |
|
The CredentialsProvider keyring name. The keyring name is only required when the CredentialsProvider being used requires the keyring name to look up the secret, which is often the case when a CredentialsProvider is shared by multiple extensions to retrieve credentials from a more dynamic source like a vault instance or secret manager Environment variable: Show more |
string |
|
The CredentialsProvider client secret key Environment variable: Show more |
string |
|
The authentication method. If the Environment variable: Show more |
|
|
JWT token source: OIDC provider client or an existing JWT bearer token. Environment variable: Show more |
|
|
If provided, indicates that JWT is signed using a secret key. It is mutually exclusive with Environment variable: Show more |
string |
|
The CredentialsProvider bean name, which should only be set if more than one CredentialsProvider is registered Environment variable: Show more |
string |
|
The CredentialsProvider keyring name. The keyring name is only required when the CredentialsProvider being used requires the keyring name to look up the secret, which is often the case when a CredentialsProvider is shared by multiple extensions to retrieve credentials from a more dynamic source like a vault instance or secret manager Environment variable: Show more |
string |
|
The CredentialsProvider client secret key Environment variable: Show more |
string |
|
String representation of a private key. If provided, indicates that JWT is signed using a private key in PEM or JWK format. It is mutually exclusive with Environment variable: Show more |
string |
|
If provided, indicates that JWT is signed using a private key in PEM or JWK format. It is mutually exclusive with Environment variable: Show more |
string |
|
If provided, indicates that JWT is signed using a private key from a keystore. It is mutually exclusive with Environment variable: Show more |
string |
|
A parameter to specify the password of the keystore file. Environment variable: Show more |
string |
|
The private key id or alias. Environment variable: Show more |
string |
|
The private key password. Environment variable: Show more |
string |
|
The JWT audience ( Environment variable: Show more |
string |
|
The key identifier of the signing key added as a JWT Environment variable: Show more |
string |
|
The issuer of the signing key added as a JWT Environment variable: Show more |
string |
|
Subject of the signing key added as a JWT Environment variable: Show more |
string |
|
Additional claims. Environment variable: Show more |
Map<String,String> |
|
The signature algorithm used for the Environment variable: Show more |
string |
|
The JWT lifespan in seconds. This value is added to the time at which the JWT was issued to calculate the expiration time. Environment variable: Show more |
int |
|
If true then the client authentication token is a JWT bearer grant assertion. Instead of producing 'client_assertion' and 'client_assertion_type' form properties, only 'assertion' is produced. This option is only supported by the OIDC client extension. Environment variable: Show more |
boolean |
|
A unique tenant identifier. It can be set by Environment variable: Show more |
string |
|
If this tenant configuration is enabled. The default tenant is disabled if it is not configured but a Environment variable: Show more |
boolean |
|
The application type, which can be one of the following Environment variable: Show more |
|
|
The relative path or absolute URL of the OpenID Connect (OIDC) authorization endpoint, which authenticates users. You must set this property for Environment variable: Show more |
string |
|
The relative path or absolute URL of the OIDC UserInfo endpoint. You must set this property for Environment variable: Show more |
string |
|
Relative path or absolute URL of the OIDC RFC7662 introspection endpoint which can introspect both opaque and JSON Web Token (JWT) tokens. This property must be set if OIDC discovery is disabled and 1) the opaque bearer access tokens must be verified or 2) JWT tokens must be verified while the cached JWK verification set with no matching JWK is being refreshed. This property is ignored if the discovery is enabled. Environment variable: Show more |
string |
|
Relative path or absolute URL of the OIDC JSON Web Key Set (JWKS) endpoint which returns a JSON Web Key Verification Set. This property should be set if OIDC discovery is disabled and the local JWT verification is required. This property is ignored if the discovery is enabled. Environment variable: Show more |
string |
|
Relative path or absolute URL of the OIDC end_session_endpoint. This property must be set if OIDC discovery is disabled and RP Initiated Logout support for the Environment variable: Show more |
string |
|
The paths which must be secured by this tenant. Tenant with the most specific path wins. Please see the Configure tenant paths section of the OIDC multitenancy guide for explanation of allowed path patterns. Environment variable: Show more |
list of string |
|
The public key for the local JWT token verification. OIDC server connection is not created when this property is set. Environment variable: Show more |
string |
|
Name Environment variable: Show more |
string |
|
Secret Environment variable: Show more |
string |
|
Include OpenId Connect Client ID configured with Environment variable: Show more |
boolean |
|
A list of paths to claims containing an array of groups. Each path starts from the top level JWT JSON object and can contain multiple segments. Each segment represents a JSON object name only; for example: "realm/groups". Use double quotes with the namespace-qualified claim names. This property can be used if a token has no Environment variable: Show more |
list of string |
|
The separator for splitting strings that contain multiple group values. It is only used if the "role-claim-path" property points to one or more custom claims whose values are strings. A single space is used by default because the standard Environment variable: Show more |
string |
|
Source of the principal roles. Environment variable: Show more |
|
|
The expected issuer Environment variable: Show more |
string |
|
The expected audience Environment variable: Show more |
list of string |
|
Require that the token includes a Environment variable: Show more |
boolean |
|
A map of required claims and their expected values. For example, Environment variable: Show more |
Map<String,String> |
|
Expected token type Environment variable: Show more |
string |
|
Life span grace period in seconds. When checking token expiry, current time is allowed to be later than token expiration time by at most the configured number of seconds. When checking token issuance, current time is allowed to be sooner than token issue time by at most the configured number of seconds. Environment variable: Show more |
int |
|
Token age. It allows for the number of seconds to be specified that must not elapse since the Environment variable: Show more |
||
Require that the token includes a Environment variable: Show more |
boolean |
|
Name of the claim which contains a principal name. By default, the Environment variable: Show more |
string |
|
Refresh expired authorization code flow ID or access tokens. If this property is enabled, a refresh token request is performed if the authorization code ID or access token has expired and, if successful, the local session is updated with the new set of tokens. Otherwise, the local session is invalidated and the user redirected to the OpenID Provider to re-authenticate. In this case, the user might not be challenged again if the OIDC provider session is still active. For this option be effective the Environment variable: Show more |
boolean |
|
The refresh token time skew, in seconds. If this property is enabled, the configured number of seconds is added to the current time when checking if the authorization code ID or access token should be refreshed. If the sum is greater than the authorization code ID or access token’s expiration time, a refresh is going to happen. Environment variable: Show more |
||
The forced JWK set refresh interval in minutes. Environment variable: Show more |
|
|
Custom HTTP header that contains a bearer token. This option is valid only when the application is of type Environment variable: Show more |
string |
|
HTTP Authorization header scheme. Environment variable: Show more |
string |
|
Required signature algorithm. OIDC providers support many signature algorithms but if necessary you can restrict Quarkus application to accept tokens signed only using an algorithm configured with this property. Environment variable: Show more |
|
|
Decryption key location. JWT tokens can be inner-signed and encrypted by OpenId Connect providers. However, it is not always possible to remotely introspect such tokens because the providers might not control the private decryption keys. In such cases set this property to point to the file containing the decryption private key in PEM or JSON Web Key (JWK) format. If this property is not set and the Environment variable: Show more |
string |
|
Allow the remote introspection of JWT tokens when no matching JWK key is available. This property is set to Environment variable: Show more |
boolean |
|
Require that JWT tokens are only introspected remotely. Environment variable: Show more |
boolean |
|
Allow the remote introspection of the opaque tokens. Set this property to Environment variable: Show more |
boolean |
|
Token customizer name. Allows to select a tenant specific token customizer as a named bean. Prefer using Environment variable: Show more |
string |
|
Indirectly verify that the opaque (binary) access token is valid by using it to request UserInfo. Opaque access token is considered valid if the provider accepted this token and returned a valid UserInfo. You should only enable this option if the opaque access tokens must be accepted but OpenId Connect provider does not have a token introspection endpoint. This property has no effect when JWT tokens must be verified. Environment variable: Show more |
boolean |
|
The relative path of the logout endpoint at the application. If provided, the application is able to initiate the logout through this endpoint in conformance with the OpenID Connect RP-Initiated Logout specification. Environment variable: Show more |
string |
|
Relative path of the application endpoint where the user should be redirected to after logging out from the OpenID Connect Provider. This endpoint URI must be properly registered at the OpenID Connect Provider as a valid redirect URI. Environment variable: Show more |
string |
|
Name of the post logout URI parameter which is added as a query parameter to the logout redirect URI. Environment variable: Show more |
string |
|
Additional properties which is added as the query parameters to the logout redirect URI. Environment variable: Show more |
Map<String,String> |
|
The relative path of the Back-Channel Logout endpoint at the application. It must start with the forward slash '/', for example, '/back-channel-logout'. This value is always resolved relative to 'quarkus.http.root-path'. Environment variable: Show more |
string |
|
Maximum number of logout tokens that can be cached before they are matched against ID tokens stored in session cookies. Environment variable: Show more |
int |
|
Number of minutes a logout token can be cached for. Environment variable: Show more |
|
|
Token cache timer interval. If this property is set, a timer checks and removes the stale entries periodically. Environment variable: Show more |
||
Logout token claim whose value is used as a key for caching the tokens. Only Environment variable: Show more |
string |
|
The relative path of the Front-Channel Logout endpoint at the application. Environment variable: Show more |
string |
|
Common name of the leaf certificate. It must be set if the Environment variable: Show more |
string |
|
Truststore file which keeps thumbprints of the trusted certificates. Environment variable: Show more |
path |
|
A parameter to specify the password of the truststore file if it is configured with Environment variable: Show more |
string |
|
A parameter to specify the alias of the truststore certificate. Environment variable: Show more |
string |
|
An optional parameter to specify type of the truststore file. If not given, the type is automatically detected based on the file name. Environment variable: Show more |
string |
|
Authorization code flow response mode. Environment variable: Show more |
|
|
The relative path for calculating a Environment variable: Show more |
string |
|
If this property is set to Environment variable: Show more |
boolean |
|
Remove the query parameters such as Environment variable: Show more |
boolean |
|
Relative path to the public endpoint which processes the error response from the OIDC authorization endpoint. If the user authentication has failed, the OIDC provider returns an Environment variable: Show more |
string |
|
Relative path to the public endpoint which an authenticated user is redirected to when the session has expired. When the OIDC session has expired and the session can not be refreshed, a user is redirected to the OIDC provider to re-authenticate. The user experience may not be ideal in this case as it may not be obvious to the authenticated user why an authentication challenge is returned. Set this property if you would like the user whose session has expired be redirected to a public application specific page instead, which can inform that the session has expired and advise the user to re-authenticated by following a link to the secured initial entry page. Environment variable: Show more |
string |
|
Both ID and access tokens are fetched from the OIDC provider as part of the authorization code flow. ID token is always verified on every user request as the primary token which is used to represent the principal and extract the roles. Authorization code flow access token is meant to be propagated to downstream services and is not verified by default unless Authorization code flow access token verification is also enabled if this token is injected as JsonWebToken. Set this property to Bearer access token is always verified. Environment variable: Show more |
boolean |
|
Force Environment variable: Show more |
boolean |
|
List of scopes Environment variable: Show more |
list of string |
|
The separator which is used when more than one scope is configured. A single space is used by default. Environment variable: Show more |
string |
|
Require that ID token includes a Environment variable: Show more |
boolean |
|
Add the Environment variable: Show more |
boolean |
|
Additional properties added as query parameters to the authentication redirect URI. Environment variable: Show more |
Map<String,String> |
|
Request URL query parameters which, if present, are added to the authentication redirect URI. Environment variable: Show more |
list of string |
|
If enabled the state, session, and post logout cookies have their Environment variable: Show more |
boolean |
|
Cookie name suffix. For example, a session cookie name for the default OIDC tenant is Environment variable: Show more |
string |
|
Cookie path parameter value which, if set, is used to set a path parameter for the session, state and post logout cookies. The Environment variable: Show more |
string |
|
Cookie path header parameter value which, if set, identifies the incoming HTTP header whose value is used to set a path parameter for the session, state and post logout cookies. If the header is missing, the Environment variable: Show more |
string |
|
Cookie domain parameter value which, if set, is used for the session, state and post logout cookies. Environment variable: Show more |
string |
|
SameSite attribute for the session cookie. Environment variable: Show more |
|
|
If a state cookie is present, a Environment variable: Show more |
boolean |
|
Fail with the HTTP 401 error if the state cookie is present but no state query parameter is present. When either multiple authentications are disabled or the redirect URL matches the original request URL, the stale state cookie might remain in the browser cache from the earlier failed redirect to an OpenId Connect provider and be visible during the current request. For example, if Single-page application (SPA) uses XHR to handle redirects to the provider which does not support CORS for its authorization endpoint, the browser blocks it and the state cookie created by Quarkus remains in the browser cache. Quarkus reports an authentication failure when it detects such an old state cookie but find no matching state query parameter. Reporting HTTP 401 error is usually the right thing to do in such cases, it minimizes a risk of the browser redirect loop but also can identify problems in the way SPA or Quarkus application manage redirects. For example, enabling However, setting this property to Environment variable: Show more |
boolean |
|
If this property is set to This property is enabled automatically if It is also enabled automatically if Environment variable: Show more |
boolean |
|
Session age extension in minutes. The user session age property is set to the value of the ID token life-span by default and the user is redirected to the OIDC provider to re-authenticate once the session has expired. If this property is set to a nonzero value, then the expired ID token can be refreshed before the session has expired. This property is ignored if the Environment variable: Show more |
|
|
State cookie age in minutes. State cookie is created every time a new authorization code flow redirect starts and removed when this flow is completed. State cookie name is unique by default, see Environment variable: Show more |
|
|
If this property is set to If this property is set to Environment variable: Show more |
boolean |
|
Requires that ID token is available when the authorization code flow completes. Disable this property only when you need to use the authorization code flow with OAuth2 providers which do not return ID token - an internal IdToken is generated in such cases. Environment variable: Show more |
boolean |
|
Internal ID token lifespan. This property is only checked when an internal IdToken is generated when Oauth2 providers do not return IdToken. Environment variable: Show more |
|
|
Requires that a Proof Key for Code Exchange (PKCE) is used. Environment variable: Show more |
boolean |
|
Secret used to encrypt Proof Key for Code Exchange (PKCE) code verifier and/or nonce in the code flow state. This secret should be at least 32 characters long. If this secret is not set, the client secret configured with either The secret is auto-generated if it remains uninitialized after checking all of these properties. Error is reported if the secret length is less than 16 characters. Environment variable: Show more |
string |
|
Additional parameters, in addition to the required Environment variable: Show more |
Map<String,String> |
|
Custom HTTP headers which must be sent to complete the authorization code grant request. Environment variable: Show more |
Map<String,String> |
|
Default TokenStateManager strategy. Environment variable: Show more |
|
|
Default TokenStateManager keeps all tokens (ID, access and refresh) returned in the authorization code grant response in a single session cookie by default. Enable this property to minimize a session cookie size Environment variable: Show more |
boolean |
|
Mandates that the Default TokenStateManager encrypt the session cookie that stores the tokens. Environment variable: Show more |
boolean |
|
The secret used by the Default TokenStateManager to encrypt the session cookie storing the tokens when If this secret is not set, the client secret configured with either The length of the secret used to encrypt the tokens should be at least 32 characters long. A warning is logged if the secret length is less than 16 characters. Environment variable: Show more |
string |
|
Session cookie key encryption algorithm Environment variable: Show more |
|
|
Allow caching the token introspection data. Note enabling this property does not enable the cache itself but only permits to cache the token introspection for a given tenant. If the default token cache can be used, see Environment variable: Show more |
boolean |
|
Allow caching the user info data. Note enabling this property does not enable the cache itself but only permits to cache the user info data for a given tenant. If the default token cache can be used, see Environment variable: Show more |
boolean |
|
Allow inlining UserInfo in IdToken instead of caching it in the token cache. This property is only checked when an internal IdToken is generated when OAuth2 providers do not return IdToken. Inlining UserInfo in the generated IdToken allows to store it in the session cookie and avoids introducing a cached state. Inlining UserInfo in the generated IdToken is enabled if the session cookie is encrypted and the UserInfo cache is not enabled or caching UserInfo is disabled for the current tenant with the Environment variable: Show more |
boolean |
|
If JWK verification keys should be fetched at the moment a connection to the OIDC provider is initialized. Disabling this property delays the key acquisition until the moment the current token has to be verified. Typically it can only be necessary if the token or other telated request properties provide an additional context which is required to resolve the keys correctly. Environment variable: Show more |
boolean |
|
Maximum number of JWK keys that can be cached. This property is ignored if the Environment variable: Show more |
int |
|
Number of minutes a JWK key can be cached for. This property is ignored if the Environment variable: Show more |
|
|
Cache timer interval. If this property is set, a timer checks and removes the stale entries periodically. This property is ignored if the Environment variable: Show more |
||
In case there is no key identifier ('kid') or certificate thumbprints ('x5t', 'x5t#S256') specified in the JOSE header and no key could be determined, check all available keys matching the token algorithm ('alg') header value. Environment variable: Show more |
boolean |
|
Well known OpenId Connect provider identifier Environment variable: Show more |
|
|
Maximum number of cache entries. Set it to a positive value if the cache has to be enabled. Environment variable: Show more |
int |
|
Maximum amount of time a given cache entry is valid for. Environment variable: Show more |
|
|
Clean up timer interval. If this property is set then a timer will check and remove the stale entries periodically. Environment variable: Show more |
||
If OIDC tenants should be resolved using the bearer access token’s issuer ( Environment variable: Show more |
boolean |
|
类型 |
默认 |
|
The base URL of the OpenID Connect (OIDC) server, for example, Environment variable: Show more |
string |
|
Discovery of the OIDC endpoints. If not enabled, you must configure the OIDC endpoint URLs individually. Environment variable: Show more |
boolean |
|
The relative path or absolute URL of the OIDC dynamic client registration endpoint. Set if Environment variable: Show more |
string |
|
The duration to attempt the initial connection to an OIDC server. For example, setting the duration to Environment variable: Show more |
||
The number of times to retry re-establishing an existing OIDC connection if it is temporarily lost. Different from Environment variable: Show more |
int |
|
The number of seconds after which the current OIDC connection request times out. Environment variable: Show more |
|
|
Whether DNS lookup should be performed on the worker thread. Use this option when you can see logged warnings about blocked Vert.x event loop by HTTP requests to OIDC server. Environment variable: Show more |
boolean |
|
The maximum size of the connection pool used by the WebClient. Environment variable: Show more |
int |
|
The host name or IP address of the Proxy. Environment variable: Show more |
string |
|
The port number of the Proxy. The default value is Environment variable: Show more |
int |
|
The username, if the Proxy needs authentication. Environment variable: Show more |
string |
|
The password, if the Proxy needs authentication. Environment variable: Show more |
string |
|
The name of the TLS configuration to use. If a name is configured, it uses the configuration from The default TLS configuration is not used by default. Environment variable: Show more |
string |
|
The OIDC token endpoint that issues access and refresh tokens; specified as a relative path or absolute URL. Set if Environment variable: Show more |
string |
|
The relative path or absolute URL of the OIDC token revocation endpoint. Environment variable: Show more |
string |
|
The client id of the application. Each application has a client id that is used to identify the application. Setting the client id is not required if Environment variable: Show more |
string |
|
The client name of the application. It is meant to represent a human readable description of the application which you may provide when an application (client) is registered in an OpenId Connect provider’s dashboard. For example, you can set this property to have more informative log messages which record an activity of the given client. Environment variable: Show more |
string |
|
The client secret used by the Environment variable: Show more |
string |
|
The client secret value. This value is ignored if Environment variable: Show more |
string |
|
The CredentialsProvider bean name, which should only be set if more than one CredentialsProvider is registered Environment variable: Show more |
string |
|
The CredentialsProvider keyring name. The keyring name is only required when the CredentialsProvider being used requires the keyring name to look up the secret, which is often the case when a CredentialsProvider is shared by multiple extensions to retrieve credentials from a more dynamic source like a vault instance or secret manager Environment variable: Show more |
string |
|
The CredentialsProvider client secret key Environment variable: Show more |
string |
|
The authentication method. If the Environment variable: Show more |
|
|
JWT token source: OIDC provider client or an existing JWT bearer token. Environment variable: Show more |
|
|
If provided, indicates that JWT is signed using a secret key. It is mutually exclusive with Environment variable: Show more |
string |
|
The CredentialsProvider bean name, which should only be set if more than one CredentialsProvider is registered Environment variable: Show more |
string |
|
The CredentialsProvider keyring name. The keyring name is only required when the CredentialsProvider being used requires the keyring name to look up the secret, which is often the case when a CredentialsProvider is shared by multiple extensions to retrieve credentials from a more dynamic source like a vault instance or secret manager Environment variable: Show more |
string |
|
The CredentialsProvider client secret key Environment variable: Show more |
string |
|
String representation of a private key. If provided, indicates that JWT is signed using a private key in PEM or JWK format. It is mutually exclusive with Environment variable: Show more |
string |
|
If provided, indicates that JWT is signed using a private key in PEM or JWK format. It is mutually exclusive with Environment variable: Show more |
string |
|
If provided, indicates that JWT is signed using a private key from a keystore. It is mutually exclusive with Environment variable: Show more |
string |
|
A parameter to specify the password of the keystore file. Environment variable: Show more |
string |
|
The private key id or alias. Environment variable: Show more |
string |
|
The private key password. Environment variable: Show more |
string |
|
The JWT audience ( Environment variable: Show more |
string |
|
The key identifier of the signing key added as a JWT Environment variable: Show more |
string |
|
The issuer of the signing key added as a JWT Environment variable: Show more |
string |
|
Subject of the signing key added as a JWT Environment variable: Show more |
string |
|
Additional claims. Environment variable: Show more |
Map<String,String> |
|
The signature algorithm used for the Environment variable: Show more |
string |
|
The JWT lifespan in seconds. This value is added to the time at which the JWT was issued to calculate the expiration time. Environment variable: Show more |
int |
|
If true then the client authentication token is a JWT bearer grant assertion. Instead of producing 'client_assertion' and 'client_assertion_type' form properties, only 'assertion' is produced. This option is only supported by the OIDC client extension. Environment variable: Show more |
boolean |
|
A unique tenant identifier. It can be set by Environment variable: Show more |
string |
|
If this tenant configuration is enabled. The default tenant is disabled if it is not configured but a Environment variable: Show more |
boolean |
|
The application type, which can be one of the following Environment variable: Show more |
|
|
The relative path or absolute URL of the OpenID Connect (OIDC) authorization endpoint, which authenticates users. You must set this property for Environment variable: Show more |
string |
|
The relative path or absolute URL of the OIDC UserInfo endpoint. You must set this property for Environment variable: Show more |
string |
|
Relative path or absolute URL of the OIDC RFC7662 introspection endpoint which can introspect both opaque and JSON Web Token (JWT) tokens. This property must be set if OIDC discovery is disabled and 1) the opaque bearer access tokens must be verified or 2) JWT tokens must be verified while the cached JWK verification set with no matching JWK is being refreshed. This property is ignored if the discovery is enabled. Environment variable: Show more |
string |
|
Relative path or absolute URL of the OIDC JSON Web Key Set (JWKS) endpoint which returns a JSON Web Key Verification Set. This property should be set if OIDC discovery is disabled and the local JWT verification is required. This property is ignored if the discovery is enabled. Environment variable: Show more |
string |
|
Relative path or absolute URL of the OIDC end_session_endpoint. This property must be set if OIDC discovery is disabled and RP Initiated Logout support for the Environment variable: Show more |
string |
|
The paths which must be secured by this tenant. Tenant with the most specific path wins. Please see the Configure tenant paths section of the OIDC multitenancy guide for explanation of allowed path patterns. Environment variable: Show more |
list of string |
|
The public key for the local JWT token verification. OIDC server connection is not created when this property is set. Environment variable: Show more |
string |
|
Name Environment variable: Show more |
string |
|
Secret Environment variable: Show more |
string |
|
Include OpenId Connect Client ID configured with Environment variable: Show more |
boolean |
|
A list of paths to claims containing an array of groups. Each path starts from the top level JWT JSON object and can contain multiple segments. Each segment represents a JSON object name only; for example: "realm/groups". Use double quotes with the namespace-qualified claim names. This property can be used if a token has no Environment variable: Show more |
list of string |
|
The separator for splitting strings that contain multiple group values. It is only used if the "role-claim-path" property points to one or more custom claims whose values are strings. A single space is used by default because the standard Environment variable: Show more |
string |
|
Source of the principal roles. Environment variable: Show more |
|
|
The expected issuer Environment variable: Show more |
string |
|
The expected audience Environment variable: Show more |
list of string |
|
Require that the token includes a Environment variable: Show more |
boolean |
|
A map of required claims and their expected values. For example, Environment variable: Show more |
Map<String,String> |
|
Expected token type Environment variable: Show more |
string |
|
Life span grace period in seconds. When checking token expiry, current time is allowed to be later than token expiration time by at most the configured number of seconds. When checking token issuance, current time is allowed to be sooner than token issue time by at most the configured number of seconds. Environment variable: Show more |
int |
|
Token age. It allows for the number of seconds to be specified that must not elapse since the Environment variable: Show more |
||
Require that the token includes a Environment variable: Show more |
boolean |
|
Name of the claim which contains a principal name. By default, the Environment variable: Show more |
string |
|
Refresh expired authorization code flow ID or access tokens. If this property is enabled, a refresh token request is performed if the authorization code ID or access token has expired and, if successful, the local session is updated with the new set of tokens. Otherwise, the local session is invalidated and the user redirected to the OpenID Provider to re-authenticate. In this case, the user might not be challenged again if the OIDC provider session is still active. For this option be effective the Environment variable: Show more |
boolean |
|
The refresh token time skew, in seconds. If this property is enabled, the configured number of seconds is added to the current time when checking if the authorization code ID or access token should be refreshed. If the sum is greater than the authorization code ID or access token’s expiration time, a refresh is going to happen. Environment variable: Show more |
||
The forced JWK set refresh interval in minutes. Environment variable: Show more |
|
|
Custom HTTP header that contains a bearer token. This option is valid only when the application is of type Environment variable: Show more |
string |
|
HTTP Authorization header scheme. Environment variable: Show more |
string |
|
Required signature algorithm. OIDC providers support many signature algorithms but if necessary you can restrict Quarkus application to accept tokens signed only using an algorithm configured with this property. Environment variable: Show more |
|
|
Decryption key location. JWT tokens can be inner-signed and encrypted by OpenId Connect providers. However, it is not always possible to remotely introspect such tokens because the providers might not control the private decryption keys. In such cases set this property to point to the file containing the decryption private key in PEM or JSON Web Key (JWK) format. If this property is not set and the Environment variable: Show more |
string |
|
Allow the remote introspection of JWT tokens when no matching JWK key is available. This property is set to Environment variable: Show more |
boolean |
|
Require that JWT tokens are only introspected remotely. Environment variable: Show more |
boolean |
|
Allow the remote introspection of the opaque tokens. Set this property to Environment variable: Show more |
boolean |
|
Token customizer name. Allows to select a tenant specific token customizer as a named bean. Prefer using Environment variable: Show more |
string |
|
Indirectly verify that the opaque (binary) access token is valid by using it to request UserInfo. Opaque access token is considered valid if the provider accepted this token and returned a valid UserInfo. You should only enable this option if the opaque access tokens must be accepted but OpenId Connect provider does not have a token introspection endpoint. This property has no effect when JWT tokens must be verified. Environment variable: Show more |
boolean |
|
The relative path of the logout endpoint at the application. If provided, the application is able to initiate the logout through this endpoint in conformance with the OpenID Connect RP-Initiated Logout specification. Environment variable: Show more |
string |
|
Relative path of the application endpoint where the user should be redirected to after logging out from the OpenID Connect Provider. This endpoint URI must be properly registered at the OpenID Connect Provider as a valid redirect URI. Environment variable: Show more |
string |
|
Name of the post logout URI parameter which is added as a query parameter to the logout redirect URI. Environment variable: Show more |
string |
|
Additional properties which is added as the query parameters to the logout redirect URI. Environment variable: Show more |
Map<String,String> |
|
The relative path of the Back-Channel Logout endpoint at the application. It must start with the forward slash '/', for example, '/back-channel-logout'. This value is always resolved relative to 'quarkus.http.root-path'. Environment variable: Show more |
string |
|
Maximum number of logout tokens that can be cached before they are matched against ID tokens stored in session cookies. Environment variable: Show more |
int |
|
Number of minutes a logout token can be cached for. Environment variable: Show more |
|
|
Token cache timer interval. If this property is set, a timer checks and removes the stale entries periodically. Environment variable: Show more |
||
Logout token claim whose value is used as a key for caching the tokens. Only Environment variable: Show more |
string |
|
The relative path of the Front-Channel Logout endpoint at the application. Environment variable: Show more |
string |
|
Common name of the leaf certificate. It must be set if the Environment variable: Show more |
string |
|
Truststore file which keeps thumbprints of the trusted certificates. Environment variable: Show more |
path |
|
A parameter to specify the password of the truststore file if it is configured with Environment variable: Show more |
string |
|
A parameter to specify the alias of the truststore certificate. Environment variable: Show more |
string |
|
An optional parameter to specify type of the truststore file. If not given, the type is automatically detected based on the file name. Environment variable: Show more |
string |
|
Authorization code flow response mode. Environment variable: Show more |
|
|
The relative path for calculating a Environment variable: Show more |
string |
|
If this property is set to Environment variable: Show more |
boolean |
|
Remove the query parameters such as Environment variable: Show more |
boolean |
|
Relative path to the public endpoint which processes the error response from the OIDC authorization endpoint. If the user authentication has failed, the OIDC provider returns an Environment variable: Show more |
string |
|
Relative path to the public endpoint which an authenticated user is redirected to when the session has expired. When the OIDC session has expired and the session can not be refreshed, a user is redirected to the OIDC provider to re-authenticate. The user experience may not be ideal in this case as it may not be obvious to the authenticated user why an authentication challenge is returned. Set this property if you would like the user whose session has expired be redirected to a public application specific page instead, which can inform that the session has expired and advise the user to re-authenticated by following a link to the secured initial entry page. Environment variable: Show more |
string |
|
Both ID and access tokens are fetched from the OIDC provider as part of the authorization code flow. ID token is always verified on every user request as the primary token which is used to represent the principal and extract the roles. Authorization code flow access token is meant to be propagated to downstream services and is not verified by default unless Authorization code flow access token verification is also enabled if this token is injected as JsonWebToken. Set this property to Bearer access token is always verified. Environment variable: Show more |
boolean |
|
Force Environment variable: Show more |
boolean |
|
List of scopes Environment variable: Show more |
list of string |
|
The separator which is used when more than one scope is configured. A single space is used by default. Environment variable: Show more |
string |
|
Require that ID token includes a Environment variable: Show more |
boolean |
|
Add the Environment variable: Show more |
boolean |
|
Additional properties added as query parameters to the authentication redirect URI. Environment variable: Show more |
Map<String,String> |
|
Request URL query parameters which, if present, are added to the authentication redirect URI. Environment variable: Show more |
list of string |
|
If enabled the state, session, and post logout cookies have their Environment variable: Show more |
boolean |
|
Cookie name suffix. For example, a session cookie name for the default OIDC tenant is Environment variable: Show more |
string |
|
Cookie path parameter value which, if set, is used to set a path parameter for the session, state and post logout cookies. The Environment variable: Show more |
string |
|
Cookie path header parameter value which, if set, identifies the incoming HTTP header whose value is used to set a path parameter for the session, state and post logout cookies. If the header is missing, the Environment variable: Show more |
string |
|
Cookie domain parameter value which, if set, is used for the session, state and post logout cookies. Environment variable: Show more |
string |
|
SameSite attribute for the session cookie. Environment variable: Show more |
|
|
If a state cookie is present, a Environment variable: Show more |
boolean |
|
Fail with the HTTP 401 error if the state cookie is present but no state query parameter is present. When either multiple authentications are disabled or the redirect URL matches the original request URL, the stale state cookie might remain in the browser cache from the earlier failed redirect to an OpenId Connect provider and be visible during the current request. For example, if Single-page application (SPA) uses XHR to handle redirects to the provider which does not support CORS for its authorization endpoint, the browser blocks it and the state cookie created by Quarkus remains in the browser cache. Quarkus reports an authentication failure when it detects such an old state cookie but find no matching state query parameter. Reporting HTTP 401 error is usually the right thing to do in such cases, it minimizes a risk of the browser redirect loop but also can identify problems in the way SPA or Quarkus application manage redirects. For example, enabling However, setting this property to Environment variable: Show more |
boolean |
|
If this property is set to This property is enabled automatically if It is also enabled automatically if Environment variable: Show more |
boolean |
|
Session age extension in minutes. The user session age property is set to the value of the ID token life-span by default and the user is redirected to the OIDC provider to re-authenticate once the session has expired. If this property is set to a nonzero value, then the expired ID token can be refreshed before the session has expired. This property is ignored if the Environment variable: Show more |
|
|
State cookie age in minutes. State cookie is created every time a new authorization code flow redirect starts and removed when this flow is completed. State cookie name is unique by default, see Environment variable: Show more |
|
|
If this property is set to If this property is set to Environment variable: Show more |
boolean |
|
Requires that ID token is available when the authorization code flow completes. Disable this property only when you need to use the authorization code flow with OAuth2 providers which do not return ID token - an internal IdToken is generated in such cases. Environment variable: Show more |
boolean |
|
Internal ID token lifespan. This property is only checked when an internal IdToken is generated when Oauth2 providers do not return IdToken. Environment variable: Show more |
|
|
Requires that a Proof Key for Code Exchange (PKCE) is used. Environment variable: Show more |
boolean |
|
Secret used to encrypt Proof Key for Code Exchange (PKCE) code verifier and/or nonce in the code flow state. This secret should be at least 32 characters long. If this secret is not set, the client secret configured with either The secret is auto-generated if it remains uninitialized after checking all of these properties. Error is reported if the secret length is less than 16 characters. Environment variable: Show more |
string |
|
Additional parameters, in addition to the required Environment variable: Show more |
Map<String,String> |
|
Custom HTTP headers which must be sent to complete the authorization code grant request. Environment variable: Show more |
Map<String,String> |
|
Default TokenStateManager strategy. Environment variable: Show more |
|
|
Default TokenStateManager keeps all tokens (ID, access and refresh) returned in the authorization code grant response in a single session cookie by default. Enable this property to minimize a session cookie size Environment variable: Show more |
boolean |
|
Mandates that the Default TokenStateManager encrypt the session cookie that stores the tokens. Environment variable: Show more |
boolean |
|
The secret used by the Default TokenStateManager to encrypt the session cookie storing the tokens when If this secret is not set, the client secret configured with either The length of the secret used to encrypt the tokens should be at least 32 characters long. A warning is logged if the secret length is less than 16 characters. Environment variable: Show more |
string |
|
Session cookie key encryption algorithm Environment variable: Show more |
|
|
Allow caching the token introspection data. Note enabling this property does not enable the cache itself but only permits to cache the token introspection for a given tenant. If the default token cache can be used, see Environment variable: Show more |
boolean |
|
Allow caching the user info data. Note enabling this property does not enable the cache itself but only permits to cache the user info data for a given tenant. If the default token cache can be used, see Environment variable: Show more |
boolean |
|
Allow inlining UserInfo in IdToken instead of caching it in the token cache. This property is only checked when an internal IdToken is generated when OAuth2 providers do not return IdToken. Inlining UserInfo in the generated IdToken allows to store it in the session cookie and avoids introducing a cached state. Inlining UserInfo in the generated IdToken is enabled if the session cookie is encrypted and the UserInfo cache is not enabled or caching UserInfo is disabled for the current tenant with the Environment variable: Show more |
boolean |
|
If JWK verification keys should be fetched at the moment a connection to the OIDC provider is initialized. Disabling this property delays the key acquisition until the moment the current token has to be verified. Typically it can only be necessary if the token or other telated request properties provide an additional context which is required to resolve the keys correctly. Environment variable: Show more |
boolean |
|
Maximum number of JWK keys that can be cached. This property is ignored if the Environment variable: Show more |
int |
|
Number of minutes a JWK key can be cached for. This property is ignored if the Environment variable: Show more |
|
|
Cache timer interval. If this property is set, a timer checks and removes the stale entries periodically. This property is ignored if the Environment variable: Show more |
||
In case there is no key identifier ('kid') or certificate thumbprints ('x5t', 'x5t#S256') specified in the JOSE header and no key could be determined, check all available keys matching the token algorithm ('alg') header value. Environment variable: Show more |
boolean |
|
Well known OpenId Connect provider identifier Environment variable: Show more |
|
About the Duration format
To write duration values, use the standard You can also use a simplified format, starting with a number:
In other cases, the simplified format is translated to the
|
Keycloak Dev Services configuration
Configuration property fixed at build time - All other configuration properties are overridable at runtime
Configuration property |
类型 |
默认值 |
---|---|---|
Flag to enable (default) or disable Dev Services. When enabled, Dev Services for Keycloak automatically configures and starts Keycloak in Dev or Test mode, and when Docker is running. Environment variable: Show more |
boolean |
|
The container image name for Dev Services providers. Defaults to a Quarkus-based Keycloak image. For a WildFly-based distribution, use an image like Environment variable: Show more |
string |
|
Indicates if a Keycloak-X image is used. By default, the image is identified by Environment variable: Show more |
boolean |
|
Determines if the Keycloak container is shared. When shared, Quarkus uses label-based service discovery to find and reuse a running Keycloak container, so a second one is not started. Otherwise, if a matching container is not is found, a new container is started. The service discovery uses the Environment variable: Show more |
boolean |
|
The value of the Environment variable: Show more |
string |
|
A comma-separated list of class or file system paths to Keycloak realm files. This list is used to initialize Keycloak. The first value in this list is used to initialize default tenant connection properties. To learn more about Keycloak realm files, consult the Importing and Exporting Keycloak Realms documentation. Environment variable: Show more |
list of string |
|
Aliases to additional class or file system resources that are used to initialize Keycloak. Each map entry represents a mapping between an alias and a class or file system resource path. Environment variable: Show more |
Map<String,String> |
|
Additional class or file system resources that are used to initialize Keycloak. Each map entry represents a mapping between a class or file system resource path alias and the Keycloak container location. Environment variable: Show more |
Map<String,String> |
|
The Environment variable: Show more |
string |
|
Show Keycloak log messages with a "Keycloak:" prefix. Environment variable: Show more |
boolean |
|
Keycloak start command. Use this property to experiment with Keycloak start options, see Environment variable: Show more |
string |
|
The name of the Keycloak realm. This property is used to create the realm if the realm file pointed to by the Environment variable: Show more |
string |
|
Specifies whether to create the Keycloak realm when no realm file is found at the Environment variable: Show more |
boolean |
|
Specifies whether to create the default client id Environment variable: Show more |
boolean |
|
Specifies whether to start the container even if the default OIDC tenant is disabled. Setting this property to true may be necessary in a multi-tenant OIDC setup, especially when OIDC tenants are created dynamically. Environment variable: Show more |
boolean |
|
A map of Keycloak usernames to passwords. If empty, default users Environment variable: Show more |
Map<String,String> |
|
A map of roles for Keycloak users. If empty, default roles are assigned: Environment variable: Show more |
Map<String,List<String>> |
|
The specific port for the dev service to listen on. If not specified, a random port is selected. Environment variable: Show more |
int |
|
Environment variables to be passed to the container. Environment variable: Show more |
Map<String,String> |
|
Memory limit for Keycloak container If not specified, 750MiB is the default memory limit. Environment variable: Show more |
|
|
The WebClient timeout. Use this property to configure how long an HTTP client used by OIDC dev service admin client will wait for a response from OpenId Connect Provider when acquiring admin token and creating realm. Environment variable: Show more |
|
About the Duration format
To write duration values, use the standard You can also use a simplified format, starting with a number:
In other cases, the simplified format is translated to the
|
About the MemorySize format
A size configuration option recognizes strings in this format (shown as a regular expression): If no suffix is given, assume bytes. |