-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Example config for JWT SSO feature #1964
Comments
Thank you Manasi. The changes look good. If there is time for more changes: In the disabling JWT section, "You can disable JWT SSO to avoid a default authentication with the JWT cookie." needs to be clarified since Tthe JWT cookie is still accepted, but will not be generated. It could be rephrased as "You can enable JWT SSO to accept authentication with an existing JWT cookie without generating it. The following example shows how to disable creating JWT cookies." Also, the sentence "The disableJwtCookie attribute is set to true for the id attribute sample." could be removed. |
@teddyjtorres I updated the draft with your suggestions. You can view it here https://draft-openlibertyio.mybluemix.net/docs/20.0.0.10/reference/feature/jwtSso-1.0.html |
Thank you for the updates. They look good. |
Thanks Manasi. Nice job. I just have a couple of questions to clarify some slight ambiguities in the wording that could be interpreted in slightly different ways. But otherwise a neat job.
|
@lauracowen I worked on your suggestions. Couldn't talk to Teddy as he is on a vaction until 14th. Will update the changes once I confirm them with him. |
Hi, "... is used to identify the JWT builder." is accurate. This is consistent with the description for "id" in https://www.ibm.com/support/knowledgecenter/en/SSAW57_liberty/com.ibm.websphere.liberty.autogen.nd.doc/ae/rwlp_config_jwtBuilder.html. When the expiresInSeconds is set, it applies to any new token that is created after the modification. Old tokens will not be modified. Therefore, please reword this sentence, "The expiresInSeconds attribute indicates the token expiration time is changed to 1800 seconds." to something like, "The expiresInSeconds attribute indicates the token expiration time is set to 1800 seconds for a newly generated token." Thank you for the updates. |
@teddyjtorres Thanks for your answers. About the |
Hi Laura. No problem. The id refers to the builder itself and it is not used for the tokens. Hi Manasi. Thank you for the changes. |
Great, thank you. Signing off. |
Hi Manasi, I don't seem to see an peerl review for the topic. Also, I don't see references to at least instances where you looked up what you are doing in the IBM quality guide. Also, do a another look up in the quality guide for clarity and concreteness. Post that you looked those things up to this issue. |
@ManasiGandhi Looking good. Peer review feedback:
It might need to go back to technical review really quick to make sure that this info is accurate. |
@Charlotte-Holt Thanks for reviewing. I worked on your peer review:
|
Edited content is on vNext and will publish with 23.0.0.9. Closing as completed. |
Determine whether there are any commonly used config examples that should go in the JWT SSO feature generated doc. Include the example from #1880. Also see #636 and #571 for related feature examples.
The text was updated successfully, but these errors were encountered: