[keycloak-user] Adapter trustore: use default java trustore possible ?
Jérôme Revillard
jrevillard at gnubila.fr
Fri Feb 19 08:41:23 EST 2016
Any advise for this please ?
Best,
Jerome
Le 17/02/2016 11:19, Jérôme Revillard a écrit :
> Yes, it seems to be the case for the server, but not for the clients.
> See the trustore config description here:
> https://keycloak.github.io/docs/userguide/keycloak-server/html/ch08.html#adapter-config
>
> Best,
> Jerome
>
> Le 17/02/2016 11:09, Bruno Oliveira a écrit :
>> I'm not sure if I got your question in the right way. But from my
>> understanding Java truststore is the standard fall back.
>>
>> See item 3.2.5
>> https://keycloak.github.io/docs/userguide/keycloak-server/html/server-installation.html
>>
>> On Wed, Feb 17, 2016 at 6:07 AM Jérôme Revillard
>> <jrevillard at gnubila.fr <mailto:jrevillard at gnubila.fr>> wrote:
>>
>> Dear all,
>>
>> I'm testing now a Keycloak server properly configured with https
>> configuration.
>> The server certificate is one which is already known by the
>> default java
>> trustore.
>> Would it be possible to setup the keycloak.json adapter config to use
>> this default java trustore ?
>>
>> Best,
>> Jerome
>>
>> _______________________________________________
>> keycloak-user mailing list
>> keycloak-user at lists.jboss.org <mailto:keycloak-user at lists.jboss.org>
>> https://lists.jboss.org/mailman/listinfo/keycloak-user
>>
>
>
> _______________________________________________
> keycloak-user mailing list
> keycloak-user at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-user
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/keycloak-user/attachments/20160219/4893d70c/attachment.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3908 bytes
Desc: Signature cryptographique S/MIME
Url : http://lists.jboss.org/pipermail/keycloak-user/attachments/20160219/4893d70c/attachment.bin
More information about the keycloak-user
mailing list