You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<1> Map the `admin` role to `Admin1` role. The `SecurityIdentity` will have both `admin` and `Admin1` roles.
446
447
<2> The `/*` path is not secured. You must secure your endpoints with standard security annotations or define HTTP permissions in addition to this configuration property.
447
448
449
+
If you prefer a programmatic configuration, the same mapping can be added with the `io.quarkus.vertx.http.security.HttpSecurity` CDI event:
<1> Authenticate all the '/api/' sub-paths with your own `HttpAuthenticationMechanism` instance.
591
+
<2> Use the Basic authentication and authorize the requests with a custom `io.quarkus.vertx.http.runtime.security.HttpSecurityPolicy`.
592
+
<3> Use the Bearer token authentication and authorize the `SecurityIdentity` with your own policy.
593
+
<4> Use Authorization Code Flow mechanism and write your own policy based on incoming request headers.
594
+
<5> When Quarkus fires the `HttpSecurity` CDI event, the runtime configuration is ready.
595
+
<6> Require that all the requests to the `/user-info` path have string permissions `openid`, `email` and `profile`.
596
+
The same authorization can be required with the `@PermissionsAllowed(value = { "openid", "email", "profile" }, inclusive = true)` annotation instance placed on an endpoint.
Copy file name to clipboardExpand all lines: extensions/oidc/deployment/src/test/java/io/quarkus/oidc/test/ImplicitBasicAuthAndBearerAuthCombinationTest.java
Copy file name to clipboardExpand all lines: extensions/vertx-http/deployment/src/main/java/io/quarkus/vertx/http/deployment/HttpSecurityProcessor.java
0 commit comments