You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/_index.md
+37-4Lines changed: 37 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -230,8 +230,41 @@ If you have roles listed in some custom claim, please see [custom claim matching
230
230
You can use gatekeeper to protect APIs, frontend server applications, frontend client applications.
231
231
Frontend server-side applications can be protected by Authorization Code Flow (also with PKCE), during which several redirection
232
232
steps take place. For protecting APIs you can use Client Credentials Grant to avoid redirections steps
233
-
involved in authorization code flow you have to use `--no-redirects=true`. For frontend applications
234
-
you can use Authorization Code Flow (also with PKCE) with encrypted refresh token cookies enabled, in this case however you have to handle redirections, e.g. at token expiration.
233
+
involved in authorization code flow you have to use `--no-redirects=true`.
234
+
235
+
From version 3.1.0 gatekeeper also supports both Authorization Code Flow and "API" mode to be configured
236
+
on same gatekeeper, example:
237
+
238
+
```yaml
239
+
# this configuration enables globally Authorization Code Flow and "API" (no-redirect=true) mode
240
+
# on /api/v1/* and /api/v2*
241
+
no-redirects: false
242
+
resources:
243
+
- uri: /api/v1/*
244
+
methods:
245
+
- GET
246
+
no-redirect: true
247
+
- uri: /api/v2/*
248
+
methods:
249
+
- GET
250
+
no-redirect: true
251
+
```
252
+
253
+
**IMPORTANT** - This will not work, from technical and backward compatibility reasons, you can override in
254
+
resources only to no-redirect=true:
255
+
256
+
```yaml
257
+
no-redirects: true
258
+
resources:
259
+
- uri: /myfrontend1
260
+
methods:
261
+
- GET
262
+
no-redirect: false
263
+
- uri: /myfrontend2
264
+
methods:
265
+
- GET
266
+
no-redirect: false
267
+
```
235
268
236
269
## Default Deny
237
270
@@ -481,7 +514,7 @@ in Keycloak, providing granular role controls over issue tokens.
481
514
482
515
``` yaml
483
516
- name: gatekeeper
484
-
image: quay.io/gogatekeeper/gatekeeper:3.0.2
517
+
image: quay.io/gogatekeeper/gatekeeper:3.1.0
485
518
args:
486
519
- --enable-forwarding=true
487
520
- --forwarding-username=projecta
@@ -508,7 +541,7 @@ Example setup client credentials grant:
0 commit comments