@@ -30,6 +30,7 @@ quarkus.http.compress-media-types=application/json,text/html,text/plain
30
30
quarkus.management.enabled =true
31
31
quarkus.micrometer.enabled =true
32
32
quarkus.micrometer.export.prometheus.enabled =true
33
+ quarkus.oidc.enabled =true
33
34
quarkus.otel.enabled =true
34
35
35
36
# ---- Runtime Configuration ----
@@ -74,6 +75,18 @@ quarkus.log.category."io.smallrye.config".level=INFO
74
75
quarkus.management.port =8182
75
76
quarkus.management.test-port =0
76
77
78
+ # OIDC settings. These settings are required only when using external authentication providers.
79
+ # See https://quarkus.io/guides/security-oidc-configuration-properties-reference
80
+ # Default tenant (disabled by default, set this to true if you use external authentication)
81
+ quarkus.oidc.tenant-enabled =false
82
+ # quarkus.oidc.auth-server-url=https://auth.example.com/realms/polaris
83
+ # quarkus.oidc.client-id=polaris
84
+ # Roles mapping; see https://quarkus.io/guides/security-oidc-bearer-token-authentication#token-claims-and-security-identity-roles
85
+ # quarkus.oidc.roles.role-claim-path=realm/groups
86
+ # Named tenants:
87
+ # quarkus.oidc.idp1.auth-server-url=https://auth.example.com/realms/polaris2
88
+ # quarkus.oidc.idp1.client-id=polaris2
89
+
77
90
# quarkus.otel.sdk.disabled is set to `true` by default to avoid spuriour errors about
78
91
# trace collector connections being impossible to establish. This setting can be enabled
79
92
# at runtime after configuring other OTel properties for proper trace data collection.
@@ -126,7 +139,14 @@ polaris.rate-limiter.token-bucket.window=PT10S
126
139
127
140
polaris.active-roles-provider.type =default
128
141
142
+ # Polaris authentication settings
143
+ polaris.authentication.type =internal
129
144
polaris.authentication.authenticator.type =default
145
+ # Per-realm overrides:
146
+ # polaris.authentication.realm1.type=external
147
+ # polaris.authentication.realm1.authenticator.type=custom
148
+
149
+ # Options effective when using internal auth (can be overridden in per realm):
130
150
polaris.authentication.token-service.type =default
131
151
polaris.authentication.token-broker.type =rsa-key-pair
132
152
polaris.authentication.token-broker.max-token-generation =PT1H
@@ -135,6 +155,27 @@ polaris.authentication.token-broker.max-token-generation=PT1H
135
155
# polaris.authentication.token-broker.symmetric-key.secret=secret
136
156
# polaris.authentication.token-broker.symmetric-key.file=/tmp/symmetric.key
137
157
158
+ # OIDC Principals mapping
159
+ polaris.oidc.principal-mapper.type =default
160
+ # polaris.oidc.principal-mapper.id-claim-path=sub
161
+ # polaris.oidc.principal-mapper.name-claim-path=preferred_username
162
+ # Per-tenant overrides:
163
+ # polaris.oidc.idp1.principal-mapper.id-claim-path=polaris/principal_id
164
+ # polaris.oidc.idp1.principal-mapper.name-claim-path=polaris/principal_name
165
+
166
+ # OIDC Principal roles mapping
167
+ polaris.oidc.principal-roles-mapper.type =default
168
+ # Principal role mapping is done through quarkus.oidc.roles.role-claim-path
169
+ # The properties below define how the roles mapped by Quarkus are converted to Polaris roles
170
+ # polaris.oidc.principal-roles-mapper.filter=PRINCIPAL_ROLE:.*
171
+ # polaris.oidc.principal-roles-mapper.mappings[0].regex=PRINCIPAL_ROLE:(.*)
172
+ # polaris.oidc.principal-roles-mapper.mappings[0].replacement=PRINCIPAL_ROLE:$1
173
+ # Per-tenant overrides:
174
+ # polaris.oidc.idp1.principal-roles-mapper.type=custom
175
+ # polaris.oidc.idp1.principal-roles-mapper.filter=POLARIS_ROLE:.*
176
+ # polaris.oidc.idp1.principal-roles-mapper.mappings[0].regex=POLARIS_ROLE:(.*)
177
+ # polaris.oidc.idp1.principal-roles-mapper.mappings[0].replacement=POLARIS_ROLE:$1
178
+
138
179
# If the following properties are unset, the default credential provider chain will be used
139
180
# polaris.storage.aws.access-key=accessKey
140
181
# polaris.storage.aws.secret-key=secretKey
0 commit comments