-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for the TLS registry to the OIDC Common HTTP client #41001
Comments
/cc @pedroigor (oidc), @sberyozkin (oidc) |
@cescoffier Thank you for driving it, it is an awesome feature. I noticed this request, I'll try to get to it soon.
If more than one OIDC tenant is used, then each tenant can have its own specific combination, i.e, keystore properties from for ex I'll investigate a bit later how to bind it with TLS registry, thanks |
@sberyozkin I just spend some time doing QE verification of TLS registry. Would you like me to implement this? If so, I will look later next week and may come with few questions. Thanks |
I take it as yes @sberyozkin , I'll draft something this week and we can iterate together to get it where you think. Thanks |
Thanks @michalvavrik |
Ad Anyway, we don't need to solve this here, I'll write it so that we can make change in one place so we can change this logic easily. |
@michalvavrik yes, that's what we do for clients - we do not look at the default TLS configuration which is only for "servers". |
Missed that, thank you. |
Description
With the integrated TLS registry, it should be possible to configure TLS using the TLS registry instead of the specific OIDC common configuration.
Implementation ideas
This is the code used for the mailer:
The text was updated successfully, but these errors were encountered: