Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

4.x: Docs - fix Security http basic authentication property #7987

Merged
merged 2 commits into from
Nov 13, 2023
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Next Next commit
fix documentation
Signed-off-by: tvallin <thibault.vallin@oracle.com>
  • Loading branch information
tvallin committed Nov 10, 2023
commit 0c1a9ca7c48c41d5cf31929c68f913c731a6318f
4 changes: 2 additions & 2 deletions docs/includes/security/providers/http-basic-auth.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -89,8 +89,8 @@ Subject is created based on the username and roles provided by the user store.
When identity propagation is configured, there are several options for identifying username and password to propagate:

1. We propagate the current username and password (inbound request must be authenticated using basic authentication).
2. We use username and password from an explicitly configured property (See `HttpBasicAuthProvider.EP_PROPERTY_OUTBOUND_USER`
and `HttpBasicAuthProvider.EP_PROPERTY_OUTBOUND_PASSWORD`)
2. We use username and password from an explicitly configured property (See `EndpointConfig.PROPERTY_OUTBOUND_ID`
and `EndpointConfig.PROPERTY_OUTBOUND_SECRET`)
3. We use username and password associated with an outbound target (see example configuration above)

Identity is propagated only if:
Expand Down
2 changes: 1 addition & 1 deletion docs/includes/security/providers/http-digest-auth.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ Java service loader service `io.helidon.security.providers.httpauth.spi.UserStor
users to the provider, such as when validated against an internal database or LDAP server.
The user store is defined so you never need the clear text password of the user.

_Note on security of HTTP Digest Authenticaton_
_Note on security of HTTP Digest Authentication_

These authentication schemes
should be _obsolete_, though they provide a very easy way to test a protected resource.
Expand Down