Skip to content

Commit

Permalink
Update conditionals with current extension name
Browse files Browse the repository at this point in the history
  • Loading branch information
rolfedh committed Jan 27, 2025
1 parent 59abb9a commit 6ed5b99
Show file tree
Hide file tree
Showing 4 changed files with 10 additions and 10 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -387,9 +387,9 @@ For more information about OIDC authentication and authorization methods that yo
|Multiple tenants that can support the Bearer token authentication or Authorization Code Flow mechanisms|xref:security-openid-connect-multitenancy.adoc[Using OpenID Connect (OIDC) multi-tenancy]
|Securing Quarkus with commonly used OpenID Connect providers|xref:security-openid-connect-providers.adoc[Configuring well-known OpenID Connect providers]
|Using Keycloak to centralize authorization |xref:security-keycloak-authorization.adoc[Using OpenID Connect (OIDC) and Keycloak to centralize authorization]
ifndef::no-quarkus-keycloak-admin-client[]
ifndef::no-quarkus-keycloak-admin-resteasy-client[]
|Configuring Keycloak programmatically |xref:security-keycloak-admin-client.adoc[Using the Keycloak admin client]
endif::no-quarkus-keycloak-admin-client[]
endif::no-quarkus-keycloak-admin-resteasy-client[]
|====

[NOTE]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -228,13 +228,13 @@ docker run --name keycloak -e KC_BOOTSTRAP_ADMIN_USERNAME=admin -e KC_BOOTSTRAP_

For more information, see the Keycloak documentation about link:https://www.keycloak.org/docs/latest/server_admin/index.html#configuring-realms[creating and configuring a new realm].

ifndef::no-quarkus-keycloak-admin-client[]
ifndef::no-quarkus-keycloak-admin-resteasy-client[]
[NOTE]
====
If you want to use the Keycloak Admin Client to configure your server from your application, you need to include either the `quarkus-keycloak-admin-rest-client` or the `quarkus-keycloak-admin-resteasy-client` (if the application uses `quarkus-rest-client`) extension.
For more information, see the xref:security-keycloak-admin-client.adoc[Quarkus Keycloak Admin Client] guide.
====
endif::no-quarkus-keycloak-admin-client[]
endif::no-quarkus-keycloak-admin-resteasy-client[]



Expand Down Expand Up @@ -383,6 +383,6 @@ For information about writing integration tests that depend on `Dev Services for
* xref:security-jwt-build.adoc[Sign and encrypt JWT tokens with SmallRye JWT Build]
* xref:security-authentication-mechanisms.adoc#combining-authentication-mechanisms[Combining authentication mechanisms]
* xref:security-overview.adoc[Quarkus Security overview]
ifndef::no-quarkus-keycloak-admin-client[]
ifndef::no-quarkus-keycloak-admin-resteasy-client[]
* xref:security-keycloak-admin-client.adoc[Quarkus Keycloak Admin Client]
endif::no-quarkus-keycloak-admin-client[]
endif::no-quarkus-keycloak-admin-resteasy-client[]
Original file line number Diff line number Diff line change
Expand Up @@ -1594,7 +1594,7 @@ section of the OpenID Connect Multi-Tenancy guide.
* xref:security-authentication-mechanisms.adoc#oidc-jwt-oauth2-comparison[Choosing between OpenID Connect, SmallRye JWT, and OAuth2 authentication mechanisms]
* xref:security-authentication-mechanisms.adoc#combining-authentication-mechanisms[Combining authentication mechanisms]
* xref:security-overview.adoc[Quarkus Security overview]
ifndef::no-quarkus-keycloak-admin-client[]
ifndef::no-quarkus-keycloak-admin-resteasy-client[]
* xref:security-keycloak-admin-client.adoc[Quarkus Keycloak Admin Client]
endif::no-quarkus-keycloak-admin-client[]
endif::no-quarkus-keycloak-admin-resteasy-client[]
* xref:security-openid-connect-multitenancy.adoc[Using OpenID Connect Multi-Tenancy]
Original file line number Diff line number Diff line change
Expand Up @@ -287,9 +287,9 @@ After you have completed this tutorial, explore xref:security-oidc-bearer-token-
* xref:security-openid-connect-dev-services.adoc[Dev Services for Keycloak]
* xref:security-jwt-build.adoc[Sign and encrypt JWT tokens with SmallRye JWT Build]
* xref:security-authentication-mechanisms.adoc#oidc-jwt-oauth2-comparison[Choosing between OpenID Connect, SmallRye JWT, and OAuth2 authentication mechanisms]
ifndef::no-quarkus-keycloak-admin-client[]
ifndef::no-quarkus-keycloak-admin-resteasy-client[]
* xref:security-keycloak-admin-client.adoc[Quarkus Keycloak Admin Client]
endif::no-quarkus-keycloak-admin-client[]
endif::no-quarkus-keycloak-admin-resteasy-client[]
* https://www.keycloak.org/documentation.html[Keycloak Documentation]
* xref:security-oidc-auth0-tutorial.adoc[Protect Quarkus web application by using Auth0 OpenID Connect provider]
* https://openid.net/connect/[OpenID Connect]
Expand Down

0 comments on commit 6ed5b99

Please sign in to comment.