native auth
This commit is contained in:
17
.env.example
17
.env.example
@@ -11,17 +11,10 @@ REDIS_HOST=localhost
|
||||
REDIS_PORT=6379
|
||||
|
||||
# JWT Configuration
|
||||
# Keycloak realm URL (no trailing slash). Example: https://keycloak.example.com/realms/friendolls
|
||||
JWT_ISSUER=https://your-keycloak-instance.com/auth/realms/your-realm-name
|
||||
|
||||
# The expected audience in the JWT token (usually the client ID for this API)
|
||||
JWT_SECRET=replace-with-strong-random-secret
|
||||
JWT_ISSUER=friendolls
|
||||
JWT_AUDIENCE=friendolls-api
|
||||
JWT_EXPIRES_IN_SECONDS=3600
|
||||
|
||||
# Keycloak client used for access tokens
|
||||
KEYCLOAK_CLIENT_ID=friendolls-api
|
||||
# Optional: client secret for revoking refresh tokens (omit for public clients)
|
||||
KEYCLOAK_CLIENT_SECRET=
|
||||
|
||||
# JWKS URI for fetching public keys to verify JWT signatures
|
||||
# Format: {KEYCLOAK_AUTH_SERVER_URL}/realms/{KEYCLOAK_REALM}/protocol/openid-connect/certs
|
||||
JWKS_URI=https://your-keycloak-instance.com/auth/realms/your-realm-name/protocol/openid-connect/certs
|
||||
# Temporary migration flow (remove after migration)
|
||||
ALLOW_LEGACY_PASSWORD=true
|
||||
|
||||
Reference in New Issue
Block a user