You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We need to define CA trust for our adapter when it fetches new public keys. Currently this is possible in an arcane way using environment variables but requires detailed knowledge on how to do that.
A natural way to configure that would be with some sort of “ca:” property in KeyCloakConfig.
Version
15.0.2-redhat-00001
Expected behavior
It should be easy to supply trust for key fetch requests.
Actual behavior
We are using NODE_EXTRA_CA_CERTS instead. It is suboptimal and creates a few problems when running CI/CD and when the node process should have different trust roots for different endpoints.
How to Reproduce?
No response
Anything else?
No response
The text was updated successfully, but these errors were encountered:
Describe the bug
We need to define CA trust for our adapter when it fetches new public keys. Currently this is possible in an arcane way using environment variables but requires detailed knowledge on how to do that.
A natural way to configure that would be with some sort of “ca:” property in KeyCloakConfig.
Version
15.0.2-redhat-00001
Expected behavior
It should be easy to supply trust for key fetch requests.
Actual behavior
We are using NODE_EXTRA_CA_CERTS instead. It is suboptimal and creates a few problems when running CI/CD and when the node process should have different trust roots for different endpoints.
How to Reproduce?
No response
Anything else?
No response
The text was updated successfully, but these errors were encountered: