This is an automated email from the ASF dual-hosted git repository.

tiagobento pushed a commit to branch main
in repository 
https://gitbox.apache.org/repos/asf/incubator-kie-kogito-examples.git


The following commit(s) were added to refs/heads/main by this push:
     new a3792d47e NO-ISSUE: Remove Management Console from examples (#2047)
a3792d47e is described below

commit a3792d47e7d2c64e9747d7f5392124a1e527100f
Author: Luiz João Motta <[email protected]>
AuthorDate: Thu Jan 16 12:44:26 2025 -0300

    NO-ISSUE: Remove Management Console from examples (#2047)
    
    * Remove management console
    
    * fix module name
---
 .../extended/docker-compose/README.md              |    2 -
 .../extended/docker-compose/docker-compose.yml     |   15 -
 .../extended/travels/README.md                     |    3 -
 .../kogito-travel-agency/extended/visas/README.md  |    1 -
 kogito-quarkus-examples/ocp-tryout/README.md       |    4 -
 .../ocp-tryout/installer.properties                |    1 -
 kogito-quarkus-examples/ocp-tryout/installer.sh    |    5 +-
 .../ocp-tryout/keycloak/keycloak.sh                |    4 +-
 .../deployment-patch.yaml                          |   49 -
 .../kogito-management-console.sh                   |   47 -
 .../ocp-tryout/kogito-shared/README.md             |    2 -
 kogito-quarkus-examples/ocp-tryout/uninstaller.sh  |    3 +-
 kogito-quarkus-examples/pom.xml                    |    2 +-
 .../process-instance-migration-quarkus/README.md   |    3 -
 .../docker-compose/keycloak/kogito-realm.json      | 2241 --------------------
 .../docs/images/Job_details.png                    |  Bin 98137 -> 0 bytes
 .../docs/images/JobsPanel.png                      |  Bin 128636 -> 0 bytes
 .../docs/images/MC_details_1_new_hiring.png        |  Bin 126873 -> 0 bytes
 .../docs/images/MC_details_2_IT_executed_job.png   |  Bin 132306 -> 0 bytes
 .../docs/images/MC_list.png                        |  Bin 65374 -> 0 bytes
 .../README.md                                      |   64 +-
 .../docker-compose/.gitignore                      |    0
 .../docker-compose/README.md                       |    4 -
 .../docker-compose/docker-compose-infinispan.yml   |   36 -
 .../docker-compose/docker-compose-postgresql.yml   |   46 -
 .../docker-compose/infinispan/infinispan.xml       |    0
 .../docker-compose/pgadmin/pgpass                  |    0
 .../docker-compose/pgadmin/servers.json            |    0
 .../docker-compose/sql/init.sql                    |    0
 .../docker-compose/startServices.sh                |    0
 .../docs/images/Process-with-job.png               |  Bin
 .../docs/images/services.png                       |  Bin
 .../pom.xml                                        |    0
 .../src/main/java/org/kie/kogito/hr/Candidate.java |    0
 .../main/resources/META-INF/processSVG/hiring.svg  |    0
 .../main/resources/META-INF/resources/index.html   |    0
 .../src/main/resources/application.properties      |    0
 .../src/main/resources/hiring.bpmn                 |    0
 .../java/org/kie/kogito/hr/HiringProcessIT.java    |    0
 .../src/test/resources/application.properties      |    0
 40 files changed, 7 insertions(+), 2525 deletions(-)

diff --git 
a/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/README.md
 
b/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/README.md
index caeaad2fe..5d313a01f 100644
--- 
a/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/README.md
+++ 
b/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/README.md
@@ -7,7 +7,6 @@ To allow a quick setup of all services required to run this 
demo, we provide a d
 - Grafana
 - Keycloak
 - Kogito Data Index
-- Kogito Management Console
 
 This setup ensures that all services are connected using the default 
configuration as well as provisioning the Travel Agency dashboard to Grafana.  
 
@@ -39,7 +38,6 @@ In order to use it, please ensure you have Docker Compose 
installed on your mach
   - Grafana: 3000
   - Keycloak: 8480
   - Data Index: 8180
-  - Management Console: 8280
   
 To access the Grafana dashboard, simply navigate to http://localhost:3000 and 
login using the default username 'admin' and password 'admin'.
 Prometheus will also be available on http://localhost:9090, no authentication 
is required. 
diff --git 
a/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/docker-compose.yml
 
b/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/docker-compose.yml
index 5118e4a03..66b58e8be 100644
--- 
a/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/docker-compose.yml
+++ 
b/kogito-quarkus-examples/kogito-travel-agency/extended/docker-compose/docker-compose.yml
@@ -126,18 +126,3 @@ services:
       QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
       KAFKA_BOOTSTRAP_SERVERS: kafka:29092
       KOGITO_DATA_INDEX_PROPS: 
-Dkogito.protobuf.folder=/home/kogito/data/protobufs/
-
-  management-console:
-    container_name: management-console
-    image: quay.io/kiegroup/kogito-management-console:${KOGITO_VERSION}
-    ports:
-      - 8280:8080
-    depends_on:
-      data-index:
-        condition: service_started
-    volumes:
-      - ./svg/:/home/kogito/data/svg/
-    environment:
-      KOGITO_DATAINDEX_HTTP_URL: 
http://${DOCKER_GATEWAY_HOST:-host.docker.internal}:8180/graphql
-      KOGITO_MANAGEMENT_CONSOLE_PROPS: 
-Dkogito.consoles.keycloak.config.url=http://localhost:8480/auth 
-Dkogito.consoles.keycloak.config.health-check-url=http://localhost:8480/auth/realms/kogito/.well-known/openid-configuration
 -Dkogito.svg.folder.path=/home/kogito/data/svg
-      QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
diff --git 
a/kogito-quarkus-examples/kogito-travel-agency/extended/travels/README.md 
b/kogito-quarkus-examples/kogito-travel-agency/extended/travels/README.md
index e5f32f64c..8f7e92e19 100644
--- a/kogito-quarkus-examples/kogito-travel-agency/extended/travels/README.md
+++ b/kogito-quarkus-examples/kogito-travel-agency/extended/travels/README.md
@@ -34,8 +34,6 @@ the response with the visa processing outcome - approved or 
rejected.
 * Create or import UI components using **Kogito Data Index Service**
 * Add metrics support for processes and decisions
 * Create dashboard based on metrics
-* Connect the **Kogito Management Console** to the  **Kogito Data Index 
Service**
-
 
 ## Data model
 
@@ -151,7 +149,6 @@ Once all services bootstrap, the following ports will be 
assigned on your local
 - Kafka: 9092
 - Data Index: 8180
 - Keycloak server: 8480
-- Management Console: 8280
 
 > **_NOTE:_**  This step requires the project to be compiled, please consider 
 > running a ```mvn clean install``` command on the project root before running 
 > the ```startServices.sh``` script for the first time or any time you modify 
 > the project.
 
diff --git 
a/kogito-quarkus-examples/kogito-travel-agency/extended/visas/README.md 
b/kogito-quarkus-examples/kogito-travel-agency/extended/visas/README.md
index 7fe2f1ae9..114e04cdc 100644
--- a/kogito-quarkus-examples/kogito-travel-agency/extended/visas/README.md
+++ b/kogito-quarkus-examples/kogito-travel-agency/extended/visas/README.md
@@ -95,7 +95,6 @@ Once all services bootstrap, the following ports will be 
assigned on your local
 - Kafka: 9092
 - Data Index: 8180
 - Keycloak server: 8480
-- Management Console: 8280
 
 > **_NOTE:_**  This step requires the project to be compiled, please consider 
 > running a ```mvn clean install``` command on the project root before running 
 > the ```startServices.sh``` script for the first time or any time you modify 
 > the project.
 
diff --git a/kogito-quarkus-examples/ocp-tryout/README.md 
b/kogito-quarkus-examples/ocp-tryout/README.md
index 9a40ccb36..138778173 100644
--- a/kogito-quarkus-examples/ocp-tryout/README.md
+++ b/kogito-quarkus-examples/ocp-tryout/README.md
@@ -24,7 +24,6 @@ Make sure you meet the [prerequisites](#prerequisites) and 
then start [here](#in
 ### Available Kogito services
 Installation from pre-build images
 - [Data 
Index](https://docs.jboss.org/kogito/release/1.15.0/html_single/#con-data-index-service_kogito-configuring)
-- [Management 
console](https://docs.jboss.org/kogito/release/1.15.0/html_single/#con-management-console_kogito-developing-process-services)
 
 - [Jobs 
service](https://docs.jboss.org/kogito/release/latest/html_single/#con-jobs-service_kogito-configuring)
 
 ## Architecture 
@@ -83,8 +82,6 @@ All configuration required to make those connections as well 
as initializations
 - `kogito.dataindex.httpurl` - the dataindex url, protocol: http
 - `kogito.dataindex.httpurl.with.graphql` - the dataindex graphql url
 - `kogito.dataindex.wsurl` - the dataindex url, protocol: ws
-### Kogito Management Console Configurations
-- `kogito.managementconsole.props` - command line properties for the 
management console
 ### Kogito Job Service Configurations
 - `kogito.jobsservice.props` - command line properties for the job service
 
@@ -99,7 +96,6 @@ if marked `-` then namespace defaults are applied
 |**namespace default per deployment/statefulSet**|10m|64Mi|1|750Mi|
 |keycloak|-|-|-|-|
 |kogito-data-index-infinispan|-|-|-|500Mi|
-|kogito-management-console|-|-|-|500Mi|
 |kogito-jobs-service|-|-|-|500Mi|
 |kogito-travel-agency-travels-jvm|-|-|-|500Mi|
 |kogito-travel-agency-visas-jvm|-|-|-|500Mi|
diff --git a/kogito-quarkus-examples/ocp-tryout/installer.properties 
b/kogito-quarkus-examples/ocp-tryout/installer.properties
index 685f1ee56..3f1dc40e4 100644
--- a/kogito-quarkus-examples/ocp-tryout/installer.properties
+++ b/kogito-quarkus-examples/ocp-tryout/installer.properties
@@ -31,7 +31,6 @@ INFINISPAN=N
 KAFKA=N
 KEYCLOAK=N
 KOGITO_DATA_INDEX=N
-KOGITO_MANAGEMENT_CONSOLE=N
 KOGITO_JOBS_SERVICE=N
 TEST_APP=N
 
diff --git a/kogito-quarkus-examples/ocp-tryout/installer.sh 
b/kogito-quarkus-examples/ocp-tryout/installer.sh
index 7e4db9676..9575493d2 100755
--- a/kogito-quarkus-examples/ocp-tryout/installer.sh
+++ b/kogito-quarkus-examples/ocp-tryout/installer.sh
@@ -20,7 +20,7 @@
 
 
 # firstly, any Kogito unrelated infrastructure like infinispan, kafka, etc. is 
installed
-# secondly, any Kogito services like data-index, management console, etc. is 
installed
+# secondly, any Kogito services like data-index, etc. is installed
 # thirdly, the application to try out is installed
 
 source installer.properties
@@ -29,7 +29,7 @@ source common-functions.sh
 action=install
 
 components=(SHARED_CONFIG INFINISPAN KAFKA KEYCLOAK \
-           KOGITO_DATA_INDEX KOGITO_MANAGEMENT_CONSOLE KOGITO_JOBS_SERVICE \
+           KOGITO_DATA_INDEX KOGITO_JOBS_SERVICE \
            TEST_APP)
 # override the installer properties configuration if needed
 function overrideEnvVariables(){
@@ -110,7 +110,6 @@ function install(){
   dbType="infinispan"
 
   componentAction "${KOGITO_DATA_INDEX}" "kogito-data-index" "${dbType}"
-  componentAction "${KOGITO_MANAGEMENT_CONSOLE}" "kogito-management-console"
   componentAction "${KOGITO_JOBS_SERVICE}" "kogito-jobs-service" "${dbType}"
 
   componentAction "${TEST_APP}" "testapp"
diff --git a/kogito-quarkus-examples/ocp-tryout/keycloak/keycloak.sh 
b/kogito-quarkus-examples/ocp-tryout/keycloak/keycloak.sh
index d393eb799..a8db93c1d 100755
--- a/kogito-quarkus-examples/ocp-tryout/keycloak/keycloak.sh
+++ b/kogito-quarkus-examples/ocp-tryout/keycloak/keycloak.sh
@@ -23,9 +23,7 @@ action=$1
 
 # NOTE: if need to update kogito_realm.json, edit content of 
kogito-realm-orig.json here
 function updateClientRedirectUrls(){
-  
mngConsole=\"http://kogito-management-console-$(getProjectName).$(getClusterAppsHostname)/*\"
-  additionalRedirectUris=["${mngConsole}"]
-  (jq '(.clients[] | select(.clientId=="kogito-console-quarkus") | 
.redirectUris) |= . + '${additionalRedirectUris} kogito-realm-orig.json) > 
kogito-realm.json
+  (jq '(.clients[] | select(.clientId=="kogito-console-quarkus") | 
.redirectUris) |= . + ' kogito-realm-orig.json) > kogito-realm.json
 }
 updateClientRedirectUrls
 
diff --git 
a/kogito-quarkus-examples/ocp-tryout/kogito-management-console/deployment-patch.yaml
 
b/kogito-quarkus-examples/ocp-tryout/kogito-management-console/deployment-patch.yaml
deleted file mode 100644
index 170a469c2..000000000
--- 
a/kogito-quarkus-examples/ocp-tryout/kogito-management-console/deployment-patch.yaml
+++ /dev/null
@@ -1,49 +0,0 @@
-#
-# Licensed to the Apache Software Foundation (ASF) under one
-# or more contributor license agreements.  See the NOTICE file
-# distributed with this work for additional information
-# regarding copyright ownership.  The ASF licenses this file
-# to you under the Apache License, Version 2.0 (the
-# "License"); you may not use this file except in compliance
-# with the License.  You may obtain a copy of the License at
-#
-#   http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing,
-# software distributed under the License is distributed on an
-# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-# KIND, either express or implied.  See the License for the
-# specific language governing permissions and limitations
-# under the License.
-#
-
-spec:
-  template:
-    spec:
-      volumes:
-        - name: app-pvc
-          configMap:
-            name: kogito-management-config
-      containers:
-        - name: kogito-management-console
-          volumeMounts:
-            - name: app-pvc
-              mountPath: /home/kogito/data/svg
-          env:
-            - name: KOGITO_DATAINDEX_HTTP_URL
-              valueFrom:
-                configMapKeyRef:
-                  name: kogito-configs
-                  key: kogito.dataindex.httpurl.with.graphql
-            - name: KOGITO_MANAGEMENT_CONSOLE_PROPS
-              valueFrom:
-                configMapKeyRef:
-                  name: kogito-configs
-                  key: kogito.managementconsole.props
-          resources:
-            limits:
-              cpu: '1'
-              memory: 500Mi
-            requests:
-              cpu: 10m
-              memory: 64Mi
\ No newline at end of file
diff --git 
a/kogito-quarkus-examples/ocp-tryout/kogito-management-console/kogito-management-console.sh
 
b/kogito-quarkus-examples/ocp-tryout/kogito-management-console/kogito-management-console.sh
deleted file mode 100755
index 22c1469c0..000000000
--- 
a/kogito-quarkus-examples/ocp-tryout/kogito-management-console/kogito-management-console.sh
+++ /dev/null
@@ -1,47 +0,0 @@
-#!/bin/bash
-#
-# Licensed to the Apache Software Foundation (ASF) under one
-# or more contributor license agreements.  See the NOTICE file
-# distributed with this work for additional information
-# regarding copyright ownership.  The ASF licenses this file
-# to you under the Apache License, Version 2.0 (the
-# "License"); you may not use this file except in compliance
-# with the License.  You may obtain a copy of the License at
-#
-#   http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing,
-# software distributed under the License is distributed on an
-# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-# KIND, either express or implied.  See the License for the
-# specific language governing permissions and limitations
-# under the License.
-#
-
-
-action=$1
-
-if [ "${action}" == "uninstall" ]; then
-  echo "*** uninstalling management console"
-  oc delete all,configmap --selector app=kogito-management-console -n 
$(getProjectName)
-
-elif [ "${action}" == "install" ]; then
-  echo "*** installing management console"
-  # at least empty svg folder needs to exist
-  if [ ! -d ../testapp/svg ]; then
-    mkdir ../testapp/svg
-  fi
-  # cannot add a label directly to a config map create command => workaround:
-  # create a configmap yaml locally -> update label on that locally => pipe 
into server "create cm from yaml" command
-  oc create configmap kogito-management-config --from-file=../testapp/svg -o 
yaml --dry-run=client | \
-    oc label -f- --dry-run=client -o yaml --local=true 
app=kogito-management-console | \
-    oc apply -f- -n $(getProjectName) $(dryRun)
-  oc new-app quay.io/kiegroup/kogito-management-console:"${KOGITO_VERSION}" -n 
$(getProjectName) $(dryRun "NewApp")
-  waitForPod kogito-management-console
-  oc patch deployment kogito-management-console --patch "$(cat 
deployment-patch.yaml)" -n $(getProjectName) $(dryRun)
-  waitForPod kogito-management-console
-  oc expose service/kogito-management-console -n $(getProjectName) $(dryRun)
-
-else
-  echo "*** no such action: $action"
-fi
\ No newline at end of file
diff --git a/kogito-quarkus-examples/ocp-tryout/kogito-shared/README.md 
b/kogito-quarkus-examples/ocp-tryout/kogito-shared/README.md
index 6c2726e31..b1392decb 100644
--- a/kogito-quarkus-examples/ocp-tryout/kogito-shared/README.md
+++ b/kogito-quarkus-examples/ocp-tryout/kogito-shared/README.md
@@ -21,7 +21,5 @@ There is one config map per infrastructure component.
 - `kogito.dataindex.httpurl` - the dataindex url, protocol: http
 - `kogito.dataindex.httpurl.with.graphql` - the dataindex graphql url
 - `kogito.dataindex.wsurl` - the dataindex url, protocol: ws
-#### Kogito Management Console Config
-- `kogito.managementconsole.props` - command line properties for the 
management console
 #### Kogito Job Service Config
 - `kogito.jobsservice.props` - command line properties for the job service 
\ No newline at end of file
diff --git a/kogito-quarkus-examples/ocp-tryout/uninstaller.sh 
b/kogito-quarkus-examples/ocp-tryout/uninstaller.sh
index 7e7b8532c..93061c9ea 100755
--- a/kogito-quarkus-examples/ocp-tryout/uninstaller.sh
+++ b/kogito-quarkus-examples/ocp-tryout/uninstaller.sh
@@ -25,7 +25,7 @@ source common-functions.sh
 action=uninstall
 
 components=(SHARED_CONFIG INFINISPAN KAFKA KEYCLOAK \
-           KOGITO_DATA_INDEX KOGITO_MANAGEMENT_CONSOLE KOGITO_JOBS_SERVICE \
+           KOGITO_DATA_INDEX KOGITO_JOBS_SERVICE \
            TEST_APP)
 # override the installer properties configuration if needed
 function overrideEnvVariables(){
@@ -73,7 +73,6 @@ function uninstall(){
   fi
 
   componentAction "${KOGITO_DATA_INDEX}" "kogito-data-index" "${dbType}"
-  componentAction "${KOGITO_MANAGEMENT_CONSOLE}" "kogito-management-console"
   componentAction "${KOGITO_JOBS_SERVICE}" "kogito-jobs-service" "${dbType}"
 
   componentAction "${INFINISPAN}" "infinispan"
diff --git a/kogito-quarkus-examples/pom.xml b/kogito-quarkus-examples/pom.xml
index acacf1a03..63e1eb28e 100644
--- a/kogito-quarkus-examples/pom.xml
+++ b/kogito-quarkus-examples/pom.xml
@@ -97,7 +97,7 @@
         <module>process-timer-quarkus</module>
         <module>process-usertasks-custom-lifecycle-quarkus</module>
         <module>process-usertasks-quarkus</module>
-        <module>process-usertasks-timer-quarkus-with-console</module>
+        <module>process-usertasks-timer-quarkus</module>
         <module>process-usertasks-with-security-oidc-quarkus</module>
         <module>process-usertasks-with-security-quarkus</module>
         <module>rules-incubation-api-quarkus</module>
diff --git 
a/kogito-quarkus-examples/process-instance-migration-quarkus/README.md 
b/kogito-quarkus-examples/process-instance-migration-quarkus/README.md
index c42e04438..08d12d38d 100644
--- a/kogito-quarkus-examples/process-instance-migration-quarkus/README.md
+++ b/kogito-quarkus-examples/process-instance-migration-quarkus/README.md
@@ -95,9 +95,6 @@ mvn clean package quarkus:dev -Pdevelopment
 The Development Mode will embed all the needed Infrastructure Services 
(PostgreSQL, Data-Index & Jobs Service) and won't 
 require any extra step.
 
-The `development` profile includes the **Runtime Tools Quarkus Extension** 
that exposes a new section in the **Quarkus Dev-UI** 
-with the **Management Console** functionalities. **Quarkus Dev-UI** is 
available at http://localhost:8080/q/dev
-
 > **_NOTE:_**  For more information about how to work with Kogito Runtime 
 > Tools Quarkus Extension, please refer to the [Kogito 
 > Documentation](https://docs.kogito.kie.org/latest/html_single/#con-runtime-tools-dev-ui_kogito-developing-process-services)
 >  page.
 
 ### Executing an instance of the Simple Process
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/keycloak/kogito-realm.json
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/keycloak/kogito-realm.json
deleted file mode 100644
index 80e06bd07..000000000
--- 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/keycloak/kogito-realm.json
+++ /dev/null
@@ -1,2241 +0,0 @@
-{
-  "realm": "kogito",
-  "notBefore": 0,
-  "revokeRefreshToken": false,
-  "refreshTokenMaxReuse": 0,
-  "accessTokenLifespan": 300,
-  "accessTokenLifespanForImplicitFlow": 900,
-  "ssoSessionIdleTimeout": 1800,
-  "ssoSessionMaxLifespan": 36000,
-  "ssoSessionIdleTimeoutRememberMe": 0,
-  "ssoSessionMaxLifespanRememberMe": 0,
-  "offlineSessionIdleTimeout": 2592000,
-  "offlineSessionMaxLifespanEnabled": false,
-  "offlineSessionMaxLifespan": 5184000,
-  "accessCodeLifespan": 60,
-  "accessCodeLifespanUserAction": 300,
-  "accessCodeLifespanLogin": 1800,
-  "actionTokenGeneratedByAdminLifespan": 43200,
-  "actionTokenGeneratedByUserLifespan": 300,
-  "enabled": true,
-  "sslRequired": "external",
-  "registrationAllowed": false,
-  "registrationEmailAsUsername": false,
-  "rememberMe": false,
-  "verifyEmail": false,
-  "loginWithEmailAllowed": true,
-  "duplicateEmailsAllowed": false,
-  "resetPasswordAllowed": false,
-  "editUsernameAllowed": false,
-  "bruteForceProtected": false,
-  "permanentLockout": false,
-  "maxFailureWaitSeconds": 900,
-  "minimumQuickLoginWaitSeconds": 60,
-  "waitIncrementSeconds": 60,
-  "quickLoginCheckMilliSeconds": 1000,
-  "maxDeltaTimeSeconds": 43200,
-  "failureFactor": 30,
-  "roles": {
-    "realm": [
-      {
-        "name": "managers",
-        "composite": false,
-        "clientRole": false,
-        "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
-        "attributes": {}
-      },
-      {
-        "name": "uma_authorization",
-        "description": "${role_uma_authorization}",
-        "composite": false,
-        "clientRole": false,
-        "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
-        "attributes": {}
-      },
-      {
-        "name": "admin",
-        "composite": false,
-        "clientRole": false,
-        "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
-        "attributes": {}
-      },
-      {
-        "name": "user",
-        "composite": false,
-        "clientRole": false,
-        "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
-        "attributes": {}
-      },
-      {
-        "name": "HR",
-        "composite": false,
-        "clientRole": false,
-        "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
-        "attributes": {}
-      },
-      {
-        "name": "IT",
-        "composite": false,
-        "clientRole": false,
-        "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
-        "attributes": {}
-      },
-      {
-        "name": "offline_access",
-        "description": "${role_offline-access}",
-        "composite": false,
-        "clientRole": false,
-        "containerId": "11d78bf6-6d10-4484-baba-a1388379d68b",
-        "attributes": {}
-      }
-    ],
-    "client": {
-      "realm-management": [
-        {
-          "name": "manage-identity-providers",
-          "description": "${role_manage-identity-providers}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "impersonation",
-          "description": "${role_impersonation}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "view-identity-providers",
-          "description": "${role_view-identity-providers}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "view-realm",
-          "description": "${role_view-realm}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "query-users",
-          "description": "${role_query-users}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "manage-clients",
-          "description": "${role_manage-clients}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "manage-events",
-          "description": "${role_manage-events}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "realm-admin",
-          "description": "${role_realm-admin}",
-          "composite": true,
-          "composites": {
-            "client": {
-              "realm-management": [
-                "impersonation",
-                "manage-identity-providers",
-                "view-identity-providers",
-                "view-realm",
-                "query-users",
-                "manage-clients",
-                "manage-events",
-                "manage-realm",
-                "view-authorization",
-                "manage-authorization",
-                "view-users",
-                "create-client",
-                "query-clients",
-                "query-groups",
-                "manage-users",
-                "view-clients",
-                "view-events",
-                "query-realms"
-              ]
-            }
-          },
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "manage-realm",
-          "description": "${role_manage-realm}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "view-authorization",
-          "description": "${role_view-authorization}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "manage-authorization",
-          "description": "${role_manage-authorization}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "create-client",
-          "description": "${role_create-client}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "view-users",
-          "description": "${role_view-users}",
-          "composite": true,
-          "composites": {
-            "client": {
-              "realm-management": [
-                "query-groups",
-                "query-users"
-              ]
-            }
-          },
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "query-clients",
-          "description": "${role_query-clients}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "query-groups",
-          "description": "${role_query-groups}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "manage-users",
-          "description": "${role_manage-users}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "view-clients",
-          "description": "${role_view-clients}",
-          "composite": true,
-          "composites": {
-            "client": {
-              "realm-management": [
-                "query-clients"
-              ]
-            }
-          },
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "view-events",
-          "description": "${role_view-events}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        },
-        {
-          "name": "query-realms",
-          "description": "${role_query-realms}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "376bd940-e50a-4495-80fc-9c6c07312748",
-          "attributes": {}
-        }
-      ],
-      "security-admin-console": [],
-      "admin-cli": [],
-      "kogito-service": [
-        {
-          "name": "uma_protection",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "0ac5df91-e044-4051-bd03-106a3a5fb9cc",
-          "attributes": {}
-        }
-      ],
-      "broker": [
-        {
-          "name": "read-token",
-          "description": "${role_read-token}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "53d4fe53-a039-471e-886a-28eddc950e95",
-          "attributes": {}
-        }
-      ],
-      "account": [
-        {
-          "name": "view-profile",
-          "description": "${role_view-profile}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "e55e1234-38fa-432d-8d90-39f5e024688d",
-          "attributes": {}
-        },
-        {
-          "name": "manage-account",
-          "description": "${role_manage-account}",
-          "composite": true,
-          "composites": {
-            "client": {
-              "account": [
-                "manage-account-links"
-              ]
-            }
-          },
-          "clientRole": true,
-          "containerId": "e55e1234-38fa-432d-8d90-39f5e024688d",
-          "attributes": {}
-        },
-        {
-          "name": "manage-account-links",
-          "description": "${role_manage-account-links}",
-          "composite": false,
-          "clientRole": true,
-          "containerId": "e55e1234-38fa-432d-8d90-39f5e024688d",
-          "attributes": {}
-        }
-      ]
-    }
-  },
-  "groups": [],
-  "defaultRoles": [
-    "uma_authorization",
-    "offline_access"
-  ],
-  "requiredCredentials": [
-    "password"
-  ],
-  "otpPolicyType": "totp",
-  "otpPolicyAlgorithm": "HmacSHA1",
-  "otpPolicyInitialCounter": 0,
-  "otpPolicyDigits": 6,
-  "otpPolicyLookAheadWindow": 1,
-  "otpPolicyPeriod": 30,
-  "otpSupportedApplications": [
-    "FreeOTP",
-    "Google Authenticator"
-  ],
-  "scopeMappings": [
-    {
-      "clientScope": "offline_access",
-      "roles": [
-        "offline_access"
-      ]
-    }
-  ],
-  "clients": [
-    {
-      "clientId": "account",
-      "name": "${client_account}",
-      "baseUrl": "/auth/realms/kogito/account",
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "0136c3ef-0dfd-4b13-a6d0-2c8b6358edec",
-      "defaultRoles": [
-        "view-profile",
-        "manage-account"
-      ],
-      "redirectUris": [
-        "/auth/realms/kogito/account/*"
-      ],
-      "webOrigins": [],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": false,
-      "serviceAccountsEnabled": false,
-      "publicClient": false,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {},
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": false,
-      "nodeReRegistrationTimeout": 0,
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ]
-    },
-    {
-      "clientId": "admin-cli",
-      "name": "${client_admin-cli}",
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "a951803a-79c7-46a6-8197-e32835286971",
-      "redirectUris": [],
-      "webOrigins": [],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": false,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": true,
-      "serviceAccountsEnabled": false,
-      "publicClient": true,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {},
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": false,
-      "nodeReRegistrationTimeout": 0,
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ]
-    },
-    {
-      "clientId": "broker",
-      "name": "${client_broker}",
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "e1f7edd7-e15c-43b4-8736-ff8204d16836",
-      "redirectUris": [],
-      "webOrigins": [],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": false,
-      "serviceAccountsEnabled": false,
-      "publicClient": false,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {},
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": false,
-      "nodeReRegistrationTimeout": 0,
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ]
-    },
-    {
-      "clientId": "kogito-frontend",
-      "rootUrl": "http://localhost:8082";,
-      "adminUrl": "http://localhost:8082";,
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "secret",
-      "redirectUris": [
-        "http://localhost:8082/*";
-      ],
-      "webOrigins": [
-        "http://localhost:8082";
-      ],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": true,
-      "serviceAccountsEnabled": false,
-      "publicClient": false,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {
-        "saml.assertion.signature": "false",
-        "saml.force.post.binding": "false",
-        "saml.multivalued.roles": "false",
-        "saml.encrypt": "false",
-        "saml.server.signature": "false",
-        "saml.server.signature.keyinfo.ext": "false",
-        "exclude.session.state.from.auth.response": "false",
-        "saml_force_name_id_format": "false",
-        "saml.client.signature": "false",
-        "tls.client.certificate.bound.access.tokens": "false",
-        "saml.authnstatement": "false",
-        "display.on.consent.screen": "false",
-        "saml.onetimeuse.condition": "false"
-      },
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": true,
-      "nodeReRegistrationTimeout": -1,
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ],
-      "access": {
-        "view": true,
-        "configure": true,
-        "manage": true
-      }
-    },
-    {
-      "clientId": "kogito-app",
-      "rootUrl": "http://localhost:8080";,
-      "adminUrl": "http://localhost:8080";,
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "secret",
-      "redirectUris": [
-        "http://localhost:8080/*";
-      ],
-      "webOrigins": [
-        "*"
-      ],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": true,
-      "serviceAccountsEnabled": false,
-      "publicClient": false,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {
-        "saml.assertion.signature": "false",
-        "saml.force.post.binding": "false",
-        "saml.multivalued.roles": "false",
-        "saml.encrypt": "false",
-        "saml.server.signature": "false",
-        "saml.server.signature.keyinfo.ext": "false",
-        "exclude.session.state.from.auth.response": "false",
-        "saml_force_name_id_format": "false",
-        "saml.client.signature": "false",
-        "tls.client.certificate.bound.access.tokens": "false",
-        "saml.authnstatement": "false",
-        "display.on.consent.screen": "false",
-        "saml.onetimeuse.condition": "false"
-      },
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": true,
-      "nodeReRegistrationTimeout": -1,
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ],
-      "access": {
-        "view": true,
-        "configure": true,
-        "manage": true
-      }
-    },
-    {
-      "clientId": "kogito-service",
-      "rootUrl": "",
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "secret",
-      "redirectUris": [
-        "*"
-      ],
-      "webOrigins": [
-        "*"
-      ],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": true,
-      "serviceAccountsEnabled": true,
-      "authorizationServicesEnabled": true,
-      "publicClient": false,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {},
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": true,
-      "nodeReRegistrationTimeout": -1,
-      "protocolMappers": [
-        {
-          "name": "Client ID",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usersessionmodel-note-mapper",
-          "consentRequired": false,
-          "config": {
-            "user.session.note": "clientId",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "clientId",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "Client IP Address",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usersessionmodel-note-mapper",
-          "consentRequired": false,
-          "config": {
-            "user.session.note": "clientAddress",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "clientAddress",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "Client Host",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usersessionmodel-note-mapper",
-          "consentRequired": false,
-          "config": {
-            "user.session.note": "clientHost",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "clientHost",
-            "jsonType.label": "String"
-          }
-        }
-      ],
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ],
-      "authorizationSettings": {
-        "allowRemoteResourceManagement": true,
-        "policyEnforcementMode": "ENFORCING",
-        "resources": [
-          {
-            "name": "User Resource",
-            "ownerManagedAccess": false,
-            "attributes": {},
-            "_id": "df1b74a9-3f10-499d-a581-368de48e512b",
-            "uris": [
-              "/api/users/*"
-            ]
-          },
-          {
-            "name": "Administration Resource",
-            "ownerManagedAccess": false,
-            "attributes": {},
-            "_id": "7124e2f1-e6dc-44b4-87ab-24b010090b97",
-            "uris": [
-              "/api/admin/*"
-            ]
-          }
-        ],
-        "policies": [
-          {
-            "name": "Any User Policy",
-            "description": "Any user granted with the user role can access 
something",
-            "type": "role",
-            "logic": "POSITIVE",
-            "decisionStrategy": "UNANIMOUS",
-            "config": {
-              "roles": "[{\"id\":\"user\",\"required\":false}]"
-            }
-          },
-          {
-            "name": "Only Administrators",
-            "description": "Only administrators can access",
-            "type": "role",
-            "logic": "POSITIVE",
-            "decisionStrategy": "UNANIMOUS",
-            "config": {
-              "roles": "[{\"id\":\"admin\",\"required\":false}]"
-            }
-          },
-          {
-            "name": "User Resource Permission",
-            "type": "resource",
-            "logic": "POSITIVE",
-            "decisionStrategy": "UNANIMOUS",
-            "config": {
-              "resources": "[\"User Resource\"]",
-              "applyPolicies": "[\"Any User Policy\"]"
-            }
-          },
-          {
-            "name": "Administration Resource Permission",
-            "type": "resource",
-            "logic": "POSITIVE",
-            "decisionStrategy": "UNANIMOUS",
-            "config": {
-              "resources": "[\"Administration Resource\"]",
-              "applyPolicies": "[\"Only Administrators\"]"
-            }
-          }
-        ],
-        "scopes": [],
-        "decisionStrategy": "UNANIMOUS"
-      }
-    },
-    {
-      "clientId": "kogito-console-react",
-      "rootUrl": "http://localhost:9000";,
-      "adminUrl": "http://localhost:9000/";,
-      "baseUrl": "http://localhost:9000/";,
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "**********",
-      "redirectUris": [
-        "http://localhost:9000/*";
-      ],
-      "webOrigins": [
-        "*"
-      ],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": false,
-      "serviceAccountsEnabled": false,
-      "publicClient": true,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {
-        "saml.assertion.signature": "false",
-        "saml.force.post.binding": "false",
-        "saml.multivalued.roles": "false",
-        "saml.encrypt": "false",
-        "saml.server.signature": "false",
-        "saml.server.signature.keyinfo.ext": "false",
-        "exclude.session.state.from.auth.response": "false",
-        "saml_force_name_id_format": "false",
-        "saml.client.signature": "false",
-        "tls.client.certificate.bound.access.tokens": "false",
-        "saml.authnstatement": "false",
-        "display.on.consent.screen": "false",
-        "saml.onetimeuse.condition": "false"
-      },
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": true,
-      "nodeReRegistrationTimeout": -1,
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ]
-    },
-    {
-      "clientId": "kogito-console-quarkus",
-      "rootUrl": "http://localhost:8280";,
-      "adminUrl": "http://localhost:8280/";,
-      "baseUrl": "http://localhost:8280/";,
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "**********",
-      "redirectUris": [
-        "http://localhost:8280/*";
-      ],
-      "webOrigins": [
-        "*"
-      ],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": false,
-      "serviceAccountsEnabled": false,
-      "publicClient": true,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {
-        "saml.assertion.signature": "false",
-        "saml.force.post.binding": "false",
-        "saml.multivalued.roles": "false",
-        "saml.encrypt": "false",
-        "saml.server.signature": "false",
-        "saml.server.signature.keyinfo.ext": "false",
-        "exclude.session.state.from.auth.response": "false",
-        "saml_force_name_id_format": "false",
-        "saml.client.signature": "false",
-        "tls.client.certificate.bound.access.tokens": "false",
-        "saml.authnstatement": "false",
-        "display.on.consent.screen": "false",
-        "saml.onetimeuse.condition": "false"
-      },
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": true,
-      "nodeReRegistrationTimeout": -1,
-      "protocolMappers": [
-        {
-          "name": "groups",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-realm-role-mapper",
-          "consentRequired": false,
-          "config": {
-            "multivalued": "true",
-            "user.attribute": "foo",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "groups",
-            "jsonType.label": "String"
-          }
-        }
-      ],
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ]
-    },
-    {
-      "clientId": "kogito-jobs-service",
-      "rootUrl": "http://localhost:8080";,
-      "adminUrl": "http://localhost:8080";,
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "secret",
-      "redirectUris": [
-        "http://localhost:8080/*";
-      ],
-      "webOrigins": [
-        "http://localhost:8080";
-      ],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": true,
-      "serviceAccountsEnabled": false,
-      "publicClient": false,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {
-        "saml.assertion.signature": "false",
-        "saml.force.post.binding": "false",
-        "saml.multivalued.roles": "false",
-        "saml.encrypt": "false",
-        "saml.server.signature": "false",
-        "saml.server.signature.keyinfo.ext": "false",
-        "exclude.session.state.from.auth.response": "false",
-        "saml_force_name_id_format": "false",
-        "saml.client.signature": "false",
-        "tls.client.certificate.bound.access.tokens": "false",
-        "saml.authnstatement": "false",
-        "display.on.consent.screen": "false",
-        "saml.onetimeuse.condition": "false"
-      },
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": true,
-      "nodeReRegistrationTimeout": -1,
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ],
-      "access": {
-        "view": true,
-        "configure": true,
-        "manage": true
-      }
-    },
-    {
-      "clientId": "realm-management",
-      "name": "${client_realm-management}",
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "c41b709a-a012-4c69-89d7-4f926dba0619",
-      "redirectUris": [],
-      "webOrigins": [],
-      "notBefore": 0,
-      "bearerOnly": true,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": false,
-      "serviceAccountsEnabled": false,
-      "publicClient": false,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {},
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": false,
-      "nodeReRegistrationTimeout": 0,
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ]
-    },
-    {
-      "clientId": "security-admin-console",
-      "name": "${client_security-admin-console}",
-      "baseUrl": "/auth/admin/kogito/console/index.html",
-      "surrogateAuthRequired": false,
-      "enabled": true,
-      "clientAuthenticatorType": "client-secret",
-      "secret": "e571b211-2550-475d-b87f-116ff54091ee",
-      "redirectUris": [
-        "/auth/admin/kogito/console/*"
-      ],
-      "webOrigins": [],
-      "notBefore": 0,
-      "bearerOnly": false,
-      "consentRequired": false,
-      "standardFlowEnabled": true,
-      "implicitFlowEnabled": false,
-      "directAccessGrantsEnabled": false,
-      "serviceAccountsEnabled": false,
-      "publicClient": true,
-      "frontchannelLogout": false,
-      "protocol": "openid-connect",
-      "attributes": {},
-      "authenticationFlowBindingOverrides": {},
-      "fullScopeAllowed": false,
-      "nodeReRegistrationTimeout": 0,
-      "protocolMappers": [
-        {
-          "name": "locale",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "locale",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "locale",
-            "jsonType.label": "String"
-          }
-        }
-      ],
-      "defaultClientScopes": [
-        "web-origins",
-        "role_list",
-        "profile",
-        "roles",
-        "email"
-      ],
-      "optionalClientScopes": [
-        "address",
-        "phone",
-        "offline_access",
-        "microprofile-jwt"
-      ]
-    }
-  ],
-  "clientScopes": [
-    {
-      "name": "address",
-      "description": "OpenID Connect built-in scope: address",
-      "protocol": "openid-connect",
-      "attributes": {
-        "include.in.token.scope": "true",
-        "display.on.consent.screen": "true",
-        "consent.screen.text": "${addressScopeConsentText}"
-      },
-      "protocolMappers": [
-        {
-          "name": "address",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-address-mapper",
-          "consentRequired": false,
-          "config": {
-            "user.attribute.formatted": "formatted",
-            "user.attribute.country": "country",
-            "user.attribute.postal_code": "postal_code",
-            "userinfo.token.claim": "true",
-            "user.attribute.street": "street",
-            "id.token.claim": "true",
-            "user.attribute.region": "region",
-            "access.token.claim": "true",
-            "user.attribute.locality": "locality"
-          }
-        }
-      ]
-    },
-    {
-      "name": "email",
-      "description": "OpenID Connect built-in scope: email",
-      "protocol": "openid-connect",
-      "attributes": {
-        "include.in.token.scope": "true",
-        "display.on.consent.screen": "true",
-        "consent.screen.text": "${emailScopeConsentText}"
-      },
-      "protocolMappers": [
-        {
-          "name": "email",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-property-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "email",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "email",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "email verified",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-property-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "emailVerified",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "email_verified",
-            "jsonType.label": "boolean"
-          }
-        }
-      ]
-    },
-    {
-      "name": "microprofile-jwt",
-      "description": "Microprofile - JWT built-in scope",
-      "protocol": "openid-connect",
-      "attributes": {
-        "include.in.token.scope": "true",
-        "display.on.consent.screen": "false"
-      },
-      "protocolMappers": [
-        {
-          "name": "upn",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-property-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "username",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "upn",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "groups",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-realm-role-mapper",
-          "consentRequired": false,
-          "config": {
-            "multivalued": "true",
-            "user.attribute": "foo",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "groups",
-            "jsonType.label": "String"
-          }
-        }
-      ]
-    },
-    {
-      "name": "offline_access",
-      "description": "OpenID Connect built-in scope: offline_access",
-      "protocol": "openid-connect",
-      "attributes": {
-        "consent.screen.text": "${offlineAccessScopeConsentText}",
-        "display.on.consent.screen": "true"
-      }
-    },
-    {
-      "name": "phone",
-      "description": "OpenID Connect built-in scope: phone",
-      "protocol": "openid-connect",
-      "attributes": {
-        "include.in.token.scope": "true",
-        "display.on.consent.screen": "true",
-        "consent.screen.text": "${phoneScopeConsentText}"
-      },
-      "protocolMappers": [
-        {
-          "name": "phone number verified",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "phoneNumberVerified",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "phone_number_verified",
-            "jsonType.label": "boolean"
-          }
-        },
-        {
-          "name": "phone number",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "phoneNumber",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "phone_number",
-            "jsonType.label": "String"
-          }
-        }
-      ]
-    },
-    {
-      "name": "profile",
-      "description": "OpenID Connect built-in scope: profile",
-      "protocol": "openid-connect",
-      "attributes": {
-        "include.in.token.scope": "true",
-        "display.on.consent.screen": "true",
-        "consent.screen.text": "${profileScopeConsentText}"
-      },
-      "protocolMappers": [
-        {
-          "name": "nickname",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "nickname",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "nickname",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "zoneinfo",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "zoneinfo",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "zoneinfo",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "updated at",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "updatedAt",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "updated_at",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "birthdate",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "birthdate",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "birthdate",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "given name",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-property-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "firstName",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "given_name",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "full name",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-full-name-mapper",
-          "consentRequired": false,
-          "config": {
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "userinfo.token.claim": "true"
-          }
-        },
-        {
-          "name": "middle name",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "middleName",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "middle_name",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "username",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-property-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "username",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "preferred_username",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "family name",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-property-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "lastName",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "family_name",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "gender",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "gender",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "gender",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "picture",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "picture",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "picture",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "locale",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "locale",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "locale",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "profile",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "profile",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "profile",
-            "jsonType.label": "String"
-          }
-        },
-        {
-          "name": "website",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-attribute-mapper",
-          "consentRequired": false,
-          "config": {
-            "userinfo.token.claim": "true",
-            "user.attribute": "website",
-            "id.token.claim": "true",
-            "access.token.claim": "true",
-            "claim.name": "website",
-            "jsonType.label": "String"
-          }
-        }
-      ]
-    },
-    {
-      "name": "role_list",
-      "description": "SAML role list",
-      "protocol": "saml",
-      "attributes": {
-        "consent.screen.text": "${samlRoleListScopeConsentText}",
-        "display.on.consent.screen": "true"
-      },
-      "protocolMappers": [
-        {
-          "name": "role list",
-          "protocol": "saml",
-          "protocolMapper": "saml-role-list-mapper",
-          "consentRequired": false,
-          "config": {
-            "single": "false",
-            "attribute.nameformat": "Basic",
-            "attribute.name": "Role"
-          }
-        }
-      ]
-    },
-    {
-      "name": "roles",
-      "description": "OpenID Connect scope for add user roles to the access 
token",
-      "protocol": "openid-connect",
-      "attributes": {
-        "include.in.token.scope": "false",
-        "display.on.consent.screen": "true",
-        "consent.screen.text": "${rolesScopeConsentText}"
-      },
-      "protocolMappers": [
-        {
-          "name": "realm roles",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-realm-role-mapper",
-          "consentRequired": false,
-          "config": {
-            "user.attribute": "foo",
-            "access.token.claim": "true",
-            "claim.name": "realm_access.roles",
-            "jsonType.label": "String",
-            "multivalued": "true"
-          }
-        },
-        {
-          "name": "audience resolve",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-audience-resolve-mapper",
-          "consentRequired": false,
-          "config": {}
-        },
-        {
-          "name": "client roles",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-usermodel-client-role-mapper",
-          "consentRequired": false,
-          "config": {
-            "user.attribute": "foo",
-            "access.token.claim": "true",
-            "claim.name": "resource_access.${client_id}.roles",
-            "jsonType.label": "String",
-            "multivalued": "true"
-          }
-        }
-      ]
-    },
-    {
-      "name": "web-origins",
-      "description": "OpenID Connect scope for add allowed web origins to the 
access token",
-      "protocol": "openid-connect",
-      "attributes": {
-        "include.in.token.scope": "false",
-        "display.on.consent.screen": "false",
-        "consent.screen.text": ""
-      },
-      "protocolMappers": [
-        {
-          "name": "allowed web origins",
-          "protocol": "openid-connect",
-          "protocolMapper": "oidc-allowed-origins-mapper",
-          "consentRequired": false,
-          "config": {}
-        }
-      ]
-    }
-  ],
-  "defaultDefaultClientScopes": [
-    "role_list",
-    "profile",
-    "email",
-    "roles",
-    "web-origins"
-  ],
-  "defaultOptionalClientScopes": [
-    "offline_access",
-    "address",
-    "phone",
-    "microprofile-jwt"
-  ],
-  "browserSecurityHeaders": {
-    "contentSecurityPolicyReportOnly": "",
-    "xContentTypeOptions": "nosniff",
-    "xRobotsTag": "none",
-    "xFrameOptions": "SAMEORIGIN",
-    "xXSSProtection": "1; mode=block",
-    "contentSecurityPolicy": "frame-src 'self'; frame-ancestors 'self'; 
object-src 'none';",
-    "strictTransportSecurity": "max-age=31536000; includeSubDomains"
-  },
-  "smtpServer": {},
-  "eventsEnabled": false,
-  "eventsListeners": [
-    "jboss-logging"
-  ],
-  "enabledEventTypes": [],
-  "adminEventsEnabled": false,
-  "adminEventsDetailsEnabled": false,
-  "components": {
-    
"org.keycloak.services.clientregistration.policy.ClientRegistrationPolicy": [
-      {
-        "name": "Allowed Protocol Mapper Types",
-        "providerId": "allowed-protocol-mappers",
-        "subType": "anonymous",
-        "subComponents": {},
-        "config": {
-          "allowed-protocol-mapper-types": [
-            "oidc-full-name-mapper",
-            "saml-user-attribute-mapper",
-            "saml-user-property-mapper",
-            "oidc-address-mapper",
-            "saml-role-list-mapper",
-            "oidc-sha256-pairwise-sub-mapper",
-            "oidc-usermodel-attribute-mapper",
-            "oidc-usermodel-property-mapper"
-          ]
-        }
-      },
-      {
-        "name": "Allowed Client Scopes",
-        "providerId": "allowed-client-templates",
-        "subType": "authenticated",
-        "subComponents": {},
-        "config": {
-          "allow-default-scopes": [
-            "true"
-          ]
-        }
-      },
-      {
-        "name": "Allowed Client Scopes",
-        "providerId": "allowed-client-templates",
-        "subType": "anonymous",
-        "subComponents": {},
-        "config": {
-          "allow-default-scopes": [
-            "true"
-          ]
-        }
-      },
-      {
-        "name": "Trusted Hosts",
-        "providerId": "trusted-hosts",
-        "subType": "anonymous",
-        "subComponents": {},
-        "config": {
-          "host-sending-registration-request-must-match": [
-            "true"
-          ],
-          "client-uris-must-match": [
-            "true"
-          ]
-        }
-      },
-      {
-        "name": "Full Scope Disabled",
-        "providerId": "scope",
-        "subType": "anonymous",
-        "subComponents": {},
-        "config": {}
-      },
-      {
-        "name": "Max Clients Limit",
-        "providerId": "max-clients",
-        "subType": "anonymous",
-        "subComponents": {},
-        "config": {
-          "max-clients": [
-            "200"
-          ]
-        }
-      },
-      {
-        "name": "Consent Required",
-        "providerId": "consent-required",
-        "subType": "anonymous",
-        "subComponents": {},
-        "config": {}
-      },
-      {
-        "name": "Allowed Protocol Mapper Types",
-        "providerId": "allowed-protocol-mappers",
-        "subType": "authenticated",
-        "subComponents": {},
-        "config": {
-          "allowed-protocol-mapper-types": [
-            "saml-user-attribute-mapper",
-            "oidc-full-name-mapper",
-            "saml-role-list-mapper",
-            "saml-user-property-mapper",
-            "oidc-usermodel-attribute-mapper",
-            "oidc-address-mapper",
-            "oidc-usermodel-property-mapper",
-            "oidc-sha256-pairwise-sub-mapper"
-          ]
-        }
-      }
-    ],
-    "org.keycloak.keys.KeyProvider": [
-      {
-        "name": "rsa-generated",
-        "providerId": "rsa-generated",
-        "subComponents": {},
-        "config": {
-          "privateKey": [
-            
"MIIEowIBAAKCAQEAn5T13suF8mlS+pJXp0U1bto41nW55wpcs+Rps8ZVCRyJKWqzwSCYnI7lm0rB2wBpAAO4OPoj1zlmVoFmBPsDU9Xf7rjsJb5LIzIQDCZY44aSDZt6RR+gakPiQvlzHyW/RozYpngDJF7TsTD7rdRF1xQ4RprfBF8fwK/xsU7pxbeom5xDHZhz3fiw8s+7UdbmnazDHfAjU58aUrLGgVRfUsuoHjtsptYlOIXEifaeMetXZE+HhqLYRHQPDap5fbBJl773Trosn7N9nmzN4x1xxGj9So21WC5UboQs9sAIVgizc4omjZ5Y4RN9HLH7G4YwJctNntzmnJhDui9zAO+zSQIDAQABAoIBADi+F7rTtVoft0Cfnok8o6Y58/HVxHdxiMryUd95iy0FN4RBi48FTx6D9QKFz25Ws/8sU2n3D51srIXf1u24b1N0/f39RQKaqk7mcyxOylaEuBQ
 [...]
-          ],
-          "certificate": [
-            
"MIICnTCCAYUCBgFp4EYIrjANBgkqhkiG9w0BAQsFADASMRAwDgYDVQQDDAdwcm90ZWFuMB4XDTE5MDQwMjIyNTYxOVoXDTI5MDQwMjIyNTc1OVowEjEQMA4GA1UEAwwHcHJvdGVhbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ+U9d7LhfJpUvqSV6dFNW7aONZ1uecKXLPkabPGVQkciSlqs8EgmJyO5ZtKwdsAaQADuDj6I9c5ZlaBZgT7A1PV3+647CW+SyMyEAwmWOOGkg2bekUfoGpD4kL5cx8lv0aM2KZ4AyRe07Ew+63URdcUOEaa3wRfH8Cv8bFO6cW3qJucQx2Yc934sPLPu1HW5p2swx3wI1OfGlKyxoFUX1LLqB47bKbWJTiFxIn2njHrV2RPh4ai2ER0Dw2qeX2wSZe+9066LJ+zfZ5szeMdccRo/UqNtVguVG6ELPbACFY
 [...]
-          ],
-          "priority": [
-            "100"
-          ]
-        }
-      },
-      {
-        "name": "hmac-generated",
-        "providerId": "hmac-generated",
-        "subComponents": {},
-        "config": {
-          "kid": [
-            "96afd00e-85cf-4d35-b18e-061d3813d8b2"
-          ],
-          "secret": [
-            
"qBFGKdUGf6xDgKphnRfoFzIzaFHJW4bYnZ9MinPFzN38X5_ctq-2u1q5RdZzeJukXvk2biHB8_s3DxWmmLZFsA"
-          ],
-          "priority": [
-            "100"
-          ],
-          "algorithm": [
-            "HS256"
-          ]
-        }
-      },
-      {
-        "name": "aes-generated",
-        "providerId": "aes-generated",
-        "subComponents": {},
-        "config": {
-          "kid": [
-            "b04473d3-8395-4016-b455-19a9e951106b"
-          ],
-          "secret": [
-            "x68mMOVdz3qKWzltzReV0g"
-          ],
-          "priority": [
-            "100"
-          ]
-        }
-      }
-    ]
-  },
-  "internationalizationEnabled": false,
-  "supportedLocales": [],
-  "authenticationFlows": [
-    {
-      "alias": "Handle Existing Account",
-      "description": "Handle what to do if there is existing account with same 
email/username like authenticated identity provider",
-      "providerId": "basic-flow",
-      "topLevel": false,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "idp-confirm-link",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "idp-email-verification",
-          "requirement": "ALTERNATIVE",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "requirement": "ALTERNATIVE",
-          "priority": 30,
-          "flowAlias": "Verify Existing Account by Re-authentication",
-          "userSetupAllowed": false,
-          "autheticatorFlow": true
-        }
-      ]
-    },
-    {
-      "alias": "Verify Existing Account by Re-authentication",
-      "description": "Reauthentication of existing account",
-      "providerId": "basic-flow",
-      "topLevel": false,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "idp-username-password-form",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "auth-otp-form",
-          "requirement": "OPTIONAL",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    },
-    {
-      "alias": "browser",
-      "description": "browser based authentication",
-      "providerId": "basic-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "auth-cookie",
-          "requirement": "ALTERNATIVE",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "auth-spnego",
-          "requirement": "DISABLED",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "identity-provider-redirector",
-          "requirement": "ALTERNATIVE",
-          "priority": 25,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "requirement": "ALTERNATIVE",
-          "priority": 30,
-          "flowAlias": "forms",
-          "userSetupAllowed": false,
-          "autheticatorFlow": true
-        }
-      ]
-    },
-    {
-      "alias": "clients",
-      "description": "Base authentication for clients",
-      "providerId": "client-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "client-secret",
-          "requirement": "ALTERNATIVE",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "client-jwt",
-          "requirement": "ALTERNATIVE",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "client-secret-jwt",
-          "requirement": "ALTERNATIVE",
-          "priority": 30,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "client-x509",
-          "requirement": "ALTERNATIVE",
-          "priority": 40,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    },
-    {
-      "alias": "direct grant",
-      "description": "OpenID Connect Resource Owner Grant",
-      "providerId": "basic-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "direct-grant-validate-username",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "direct-grant-validate-password",
-          "requirement": "REQUIRED",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "direct-grant-validate-otp",
-          "requirement": "OPTIONAL",
-          "priority": 30,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    },
-    {
-      "alias": "docker auth",
-      "description": "Used by Docker clients to authenticate against the IDP",
-      "providerId": "basic-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "docker-http-basic-authenticator",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    },
-    {
-      "alias": "first broker login",
-      "description": "Actions taken after first broker login with identity 
provider account, which is not yet linked to any Keycloak account",
-      "providerId": "basic-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticatorConfig": "review profile config",
-          "authenticator": "idp-review-profile",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticatorConfig": "create unique user config",
-          "authenticator": "idp-create-user-if-unique",
-          "requirement": "ALTERNATIVE",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "requirement": "ALTERNATIVE",
-          "priority": 30,
-          "flowAlias": "Handle Existing Account",
-          "userSetupAllowed": false,
-          "autheticatorFlow": true
-        }
-      ]
-    },
-    {
-      "alias": "forms",
-      "description": "Username, password, otp and other auth forms.",
-      "providerId": "basic-flow",
-      "topLevel": false,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "auth-username-password-form",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "auth-otp-form",
-          "requirement": "OPTIONAL",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    },
-    {
-      "alias": "http challenge",
-      "description": "An authentication flow based on challenge-response HTTP 
Authentication Schemes",
-      "providerId": "basic-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "no-cookie-redirect",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "basic-auth",
-          "requirement": "REQUIRED",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "basic-auth-otp",
-          "requirement": "DISABLED",
-          "priority": 30,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "auth-spnego",
-          "requirement": "DISABLED",
-          "priority": 40,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    },
-    {
-      "alias": "registration",
-      "description": "registration flow",
-      "providerId": "basic-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "registration-page-form",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "flowAlias": "registration form",
-          "userSetupAllowed": false,
-          "autheticatorFlow": true
-        }
-      ]
-    },
-    {
-      "alias": "registration form",
-      "description": "registration form",
-      "providerId": "form-flow",
-      "topLevel": false,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "registration-user-creation",
-          "requirement": "REQUIRED",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "registration-profile-action",
-          "requirement": "REQUIRED",
-          "priority": 40,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "registration-password-action",
-          "requirement": "REQUIRED",
-          "priority": 50,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "registration-recaptcha-action",
-          "requirement": "DISABLED",
-          "priority": 60,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    },
-    {
-      "alias": "reset credentials",
-      "description": "Reset credentials for a user if they forgot their 
password or something",
-      "providerId": "basic-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "reset-credentials-choose-user",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "reset-credential-email",
-          "requirement": "REQUIRED",
-          "priority": 20,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "reset-password",
-          "requirement": "REQUIRED",
-          "priority": 30,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        },
-        {
-          "authenticator": "reset-otp",
-          "requirement": "OPTIONAL",
-          "priority": 40,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    },
-    {
-      "alias": "saml ecp",
-      "description": "SAML ECP Profile Authentication Flow",
-      "providerId": "basic-flow",
-      "topLevel": true,
-      "builtIn": true,
-      "authenticationExecutions": [
-        {
-          "authenticator": "http-basic-authenticator",
-          "requirement": "REQUIRED",
-          "priority": 10,
-          "userSetupAllowed": false,
-          "autheticatorFlow": false
-        }
-      ]
-    }
-  ],
-  "authenticatorConfig": [
-    {
-      "alias": "create unique user config",
-      "config": {
-        "require.password.update.after.registration": "false"
-      }
-    },
-    {
-      "alias": "review profile config",
-      "config": {
-        "update.profile.on.first.login": "missing"
-      }
-    }
-  ],
-  "requiredActions": [
-    {
-      "alias": "CONFIGURE_TOTP",
-      "name": "Configure OTP",
-      "providerId": "CONFIGURE_TOTP",
-      "enabled": true,
-      "defaultAction": false,
-      "priority": 10,
-      "config": {}
-    },
-    {
-      "alias": "terms_and_conditions",
-      "name": "Terms and Conditions",
-      "providerId": "terms_and_conditions",
-      "enabled": false,
-      "defaultAction": false,
-      "priority": 20,
-      "config": {}
-    },
-    {
-      "alias": "UPDATE_PASSWORD",
-      "name": "Update Password",
-      "providerId": "UPDATE_PASSWORD",
-      "enabled": true,
-      "defaultAction": false,
-      "priority": 30,
-      "config": {}
-    },
-    {
-      "alias": "UPDATE_PROFILE",
-      "name": "Update Profile",
-      "providerId": "UPDATE_PROFILE",
-      "enabled": true,
-      "defaultAction": false,
-      "priority": 40,
-      "config": {}
-    },
-    {
-      "alias": "VERIFY_EMAIL",
-      "name": "Verify Email",
-      "providerId": "VERIFY_EMAIL",
-      "enabled": true,
-      "defaultAction": false,
-      "priority": 50,
-      "config": {}
-    }
-  ],
-  "browserFlow": "browser",
-  "registrationFlow": "registration",
-  "directGrantFlow": "direct grant",
-  "resetCredentialsFlow": "reset credentials",
-  "clientAuthenticationFlow": "clients",
-  "dockerAuthenticationFlow": "docker auth",
-  "attributes": {
-    "_browser_header.xXSSProtection": "1; mode=block",
-    "_browser_header.xFrameOptions": "SAMEORIGIN",
-    "_browser_header.strictTransportSecurity": "max-age=31536000; 
includeSubDomains",
-    "permanentLockout": "false",
-    "quickLoginCheckMilliSeconds": "1000",
-    "_browser_header.xRobotsTag": "none",
-    "maxFailureWaitSeconds": "900",
-    "minimumQuickLoginWaitSeconds": "60",
-    "failureFactor": "30",
-    "actionTokenGeneratedByUserLifespan": "300",
-    "maxDeltaTimeSeconds": "43200",
-    "_browser_header.xContentTypeOptions": "nosniff",
-    "offlineSessionMaxLifespan": "5184000",
-    "actionTokenGeneratedByAdminLifespan": "43200",
-    "_browser_header.contentSecurityPolicyReportOnly": "",
-    "bruteForceProtected": "false",
-    "_browser_header.contentSecurityPolicy": "frame-src 'self'; 
frame-ancestors 'self'; object-src 'none';",
-    "waitIncrementSeconds": "60",
-    "offlineSessionMaxLifespanEnabled": "false"
-  },
-  "users": [
-    {
-      "username": "admin",
-      "enabled": true,
-      "totp": false,
-      "emailVerified": false,
-      "credentials": [
-        {
-          "type": "password",
-          "hashedSaltedValue": 
"NICTtwsvSxJ5hL8hLAuleDUv9jwZcuXgxviMXvR++cciyPtiIEStEaJUyfA9DOir59awjPrHOumsclPVjNBplA==",
-          "salt": "T/2P5o5oxFJUEk68BRURRg==",
-          "hashIterations": 27500,
-          "counter": 0,
-          "algorithm": "pbkdf2-sha256",
-          "digits": 0,
-          "period": 0,
-          "createdDate": 1554245879354,
-          "config": {}
-        }
-      ],
-      "disableableCredentialTypes": [
-        "password"
-      ],
-      "requiredActions": [],
-      "realmRoles": [
-        "admin",
-        "managers",
-        "user",
-        "IT",
-        "HR"
-      ],
-      "notBefore": 0,
-      "groups": []
-    },
-    {
-      "username": "alice",
-      "enabled": true,
-      "totp": false,
-      "emailVerified": false,
-      "credentials": [
-        {
-          "type": "password",
-          "hashedSaltedValue": 
"A3okqV2T/ybXTVEgKfosoSjP8Yc9IZbFP/SY4cEd6hag7TABQrQ6nUSuwagGt96l8cw1DTijO75PqX6uiTXMzw==",
-          "salt": "sl4mXx6T9FypPH/s9TngfQ==",
-          "hashIterations": 27500,
-          "counter": 0,
-          "algorithm": "pbkdf2-sha256",
-          "digits": 0,
-          "period": 0,
-          "createdDate": 1554245879116,
-          "config": {}
-        }
-      ],
-      "disableableCredentialTypes": [
-        "password"
-      ],
-      "requiredActions": [],
-      "realmRoles": [
-        "user",
-        "HR"
-      ],
-      "notBefore": 0,
-      "groups": []
-    },
-    {
-      "username": "jdoe",
-      "enabled": true,
-      "totp": false,
-      "emailVerified": false,
-      "credentials": [
-        {
-          "type": "password",
-          "hashedSaltedValue": 
"JV3DUNLjqOadjbBOtC4rvacQI553CGaDGAzBS8MR5ReCr7SwF3E6CsW3T7/XO8ITZAsch8+A/6loeuCoVLLJrg==",
-          "salt": "uCbOH7HZtyDtMd0E9DG/nw==",
-          "hashIterations": 27500,
-          "counter": 0,
-          "algorithm": "pbkdf2-sha256",
-          "digits": 0,
-          "period": 0,
-          "createdDate": 1554245879227,
-          "config": {}
-        }
-      ],
-      "disableableCredentialTypes": [
-        "password"
-      ],
-      "requiredActions": [],
-      "realmRoles": [
-        "managers",
-        "user",
-        "IT"
-      ],
-      "notBefore": 0,
-      "groups": []
-    }
-  ],
-  "keycloakVersion": "6.0.0",
-  "userManagedAccessAllowed": false
-}
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Job_details.png
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Job_details.png
deleted file mode 100644
index b1e137922..000000000
Binary files 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Job_details.png
 and /dev/null differ
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/JobsPanel.png
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/JobsPanel.png
deleted file mode 100644
index 7f93f15e9..000000000
Binary files 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/JobsPanel.png
 and /dev/null differ
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_1_new_hiring.png
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_1_new_hiring.png
deleted file mode 100644
index c0b168e52..000000000
Binary files 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_1_new_hiring.png
 and /dev/null differ
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_2_IT_executed_job.png
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_2_IT_executed_job.png
deleted file mode 100644
index 27a94cb66..000000000
Binary files 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_details_2_IT_executed_job.png
 and /dev/null differ
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_list.png
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_list.png
deleted file mode 100644
index b9ad3c157..000000000
Binary files 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/MC_list.png
 and /dev/null differ
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/README.md
 b/kogito-quarkus-examples/process-usertasks-timer-quarkus/README.md
similarity index 74%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/README.md
rename to kogito-quarkus-examples/process-usertasks-timer-quarkus/README.md
index 1ebac9f34..5463ddf89 100644
--- 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/README.md
+++ b/kogito-quarkus-examples/process-usertasks-timer-quarkus/README.md
@@ -7,8 +7,6 @@ This Quickstart showcases a basic implementation of the 
**Hiring** process.
 This quickstart project shows very typical user task orchestration with a 
timer that avoids to execute the HR Interview task 
 after some reasonable time.(configured for test purposes to 40 seconds)
 
-> **_NOTE:_** This example uses keycloak authentication to enable security 
only in the consoles and not in runtime.
-
 <p align="center"><img width=75% height=50% 
src="docs/images/Process-with-job.png"></p>
 
 The required *Kogito and Infrastructure Services* for this example are:
@@ -17,8 +15,6 @@ The required *Kogito and Infrastructure Services* for this 
example are:
 - Kafka
 - Kogito Data Index
 - Kogito Jobs Service 
-- Kogito Management Console
-- Keycloak
 
 ## Running the Quickstart
 
@@ -77,8 +73,6 @@ Once all services bootstrap, the following ports will be 
assigned on your local
 - Kafka: 9092
 - Data Index: 8180
 - Jobs Service: 8580
-- Management Console: 8280
-- Keycloak: 8480
 - PgAdmin: 8055
 
 > **_NOTE:_**  This step requires the project to be compiled, please consider 
 > running a ```mvn clean install``` command on the project root before running 
 > the ```startServices.sh``` script for the first time or any time you modify 
 > the project.
@@ -132,7 +126,7 @@ mvn clean package -Pnative -Ppostgresql
 To run the generated native executable, generated in `target/`, execute
 
 ```sh
-./target/./target/process-usertasks-timer-quarkus-with-console-runner
+./target/./target/process-usertasks-timer-quarkus
 ```
 
 ### Run Example with Infinispan
@@ -164,8 +158,6 @@ Once all services bootstrap, the following ports will be 
assigned on your local
 - Kafka: 9092
 - Data Index: 8180
 - Jobs Service: 8580
-- Management Console: 8280
-- Keycloak: 8480
 
 > **_NOTE:_**  This step requires the project to be compiled, please consider 
 > running a ```mvn clean install -Pinfinispan``` command on the project root 
 > before running the ```startServices.sh infinispan``` script for the first 
 > time or any time you modify the project.
 
@@ -213,23 +205,9 @@ mvn clean package -Pnative -Pinfinispan
 To run the generated native executable, generated in `target/`, execute
 
 ```sh
-./target/process-usertasks-timer-quarkus-with-console-runner
+./target/process-usertasks-timer-quarkus
 ```
 
-
-### Using Keycloak as Authentication Server
-
-In this Quickstart we'll be using [Keycloak](https://www.keycloak.org/) as 
*Authentication Server*. It will be started as a part of the project 
*Infrastructure Services*, you can check the configuration on the project 
[docker-compose.yml](docker-compose/docker-compose.yml) in 
[docker-compose](docker-compose) folder.
-
-It will install the *Kogito Realm* that comes with a predefined set of users:
-| Login         | Password   | Roles               |
-| ------------- | ---------- | ------------------- |
-|    admin      |   admin    | *admin*, *managers* |
-|    alice      |   alice    | *user*              |
-|    jdoe       |   jdoe     | *managers*          |
-
-Once Keycloak is started, you should be able to access your *Keycloak Server* 
at [localhost:8480/auth](http://localhost:8480/auth) with *admin* user.
-
 ### Submit a request to start new hiring
 
 Once the service is up and running you can make use of the **Hiring** 
application by a sending request to `http://localhost:8080/hiring`  with 
following content:
@@ -257,44 +235,6 @@ curl -H "Content-Type: application/json" -H "Accept: 
application/json" -X POST h
 EOF
 ```
 
-### Show active Hiring process instance at Kogito Management Console
-
-To access the Kogito Management Console just open your browser and navigate to 
``http://localhost:8280``. You'll be redirected to the *Keycloak* log in page.
-
-<p align="center">
-    <img width=75%  src="docs/images/keycloak-login.png">
-</p>
-
-Once there, log in using any of the users specified in the [Using Keycloak as 
Authentication Server](#using-keycloak-as-authentication-server) 
-
-<p align="center">
-    <img width=75%  src="docs/images/MC_list.png">
-</p>
-
-> **_NOTE:_**  For more information about how to work with Kogito Management 
Console, please refer to the [Kogito 
Documentation](https://docs.jboss.org/kogito/release/latest/html_single/#con-management-console_kogito-developing-process-services)
 page.
-
-Check the process instance details to see where is the execution path 
-
-<p align="center">
-    <img width=75%  src="docs/images/MC_details_1_new_hiring.png">
-</p>
-
-We have configured the timer to avoid the HR interview after reasonable time 
(40s, just for testing purpose)
-
-Let's give the app more than 40s to see the timer in action.
-
-Check the process instance details 
-
-<p align="center">
-    <img width=75%  src="docs/images/MC_details_2_IT_executed_job.png">
-</p>
-
-Job panel shows the job details related to the timer execution:
-  
-<p align="center">
-    <img width=75%  src="docs/images/Job_details.png">
-</p>
-
 ### Submit a new request to start new hiring
 
 In a Terminal you can execute this command to start a **Hiring** process for 
the "Jon Snow" candidate:
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/.gitignore
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/.gitignore
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/.gitignore
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/.gitignore
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/README.md
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/README.md
similarity index 95%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/README.md
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/README.md
index 55c93d3df..f724f574b 100644
--- 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/README.md
+++ 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/README.md
@@ -6,8 +6,6 @@ To allow a quick setup of all services required to run this 
demo, we provide a d
 - Kafka
 - Kogito Data Index
 - Kogito Jobs
-- Kogito Management Console
-- Keycloak
 
 In order to use it, please ensure you have Docker Compose installed on your 
machine, otherwise follow the instructions available
 in [here](https://docs.docker.com/compose/install/).
@@ -20,8 +18,6 @@ Once all services bootstrap, the following ports will be 
assigned on your local
 - Kafka: 9092
 - Data Index: 8180
 - Jobs: 8580
-- Management Console: 8280
-- Keycloak: 8480
 
 ### Postgresql deployment:
 
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-infinispan.yml
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-infinispan.yml
similarity index 75%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-infinispan.yml
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-infinispan.yml
index f5faf3ac0..52c330e4b 100755
--- 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-infinispan.yml
+++ 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-infinispan.yml
@@ -69,23 +69,6 @@ services:
       KAFKA_OFFSETS_TOPIC_REPLICATION_FACTOR: 1
       LOG_DIR: "/tmp/logs"
 
-  keycloak:
-    container_name: keycloak
-    image: quay.io/keycloak/keycloak:legacy
-    ports:
-      - "8480:8080"
-    volumes:
-      - ./keycloak/kogito-realm.json:/tmp/kogito-realm.json
-    healthcheck:
-      test: [ "CMD", "curl", "-f", "http://localhost:8080/auth/realms/kogito"; ]
-      interval: 1s
-      timeout: 1s
-      retries: 50
-    environment:
-      KEYCLOAK_USER: admin
-      KEYCLOAK_PASSWORD: admin
-      KEYCLOAK_IMPORT: /tmp/kogito-realm.json
-
   data-index:
     container_name: data-index
     image: quay.io/kiegroup/kogito-data-index-infinispan:${KOGITO_VERSION}
@@ -122,22 +105,3 @@ services:
       QUARKUS_INFINISPAN_CLIENT_USE_AUTH: "false"
       QUARKUS_INFINISPAN_CLIENT_HOSTS: infinispan:11222
       QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
-
-  management-console:
-   container_name: management-console
-   image: quay.io/kiegroup/kogito-management-console:${KOGITO_VERSION}
-   ports:
-     - 8280:8080
-   depends_on:
-     data-index:
-       condition: service_started
-     jobs-service:
-       condition: service_started
-     keycloak:
-       condition: service_healthy
-   volumes:
-     - ./svg/:/home/kogito/data/svg/
-   environment:
-      KOGITO_DATAINDEX_HTTP_URL: http://127.0.0.1:8180/graphql
-      QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
-      KOGITO_MANAGEMENT_CONSOLE_PROPS: 
-Dkogito.consoles.keycloak.config.url=http://localhost:8480/auth 
-Dkogito.consoles.keycloak.config.health-check-url=http://localhost:8480/auth/realms/kogito/.well-known/openid-configuration
 -Dkogito.svg.folder.path=/home/kogito/data/svg
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-postgresql.yml
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-postgresql.yml
similarity index 75%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-postgresql.yml
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-postgresql.yml
index 743179f92..f0db4764d 100755
--- 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/docker-compose-postgresql.yml
+++ 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/docker-compose-postgresql.yml
@@ -91,29 +91,6 @@ services:
       KAFKA_OFFSETS_TOPIC_REPLICATION_FACTOR: 1
       LOG_DIR: "/tmp/logs"
 
-  keycloak:
-    container_name: keycloak
-    image: quay.io/keycloak/keycloak:legacy
-    ports:
-      - "8480:8080"
-    volumes:
-      - ./keycloak/kogito-realm.json:/tmp/kogito-realm.json
-    healthcheck:
-      test: [ "CMD", "curl", "-f", "http://localhost:8080/auth/realms/kogito"; ]
-      interval: 1s
-      timeout: 1s
-      retries: 50
-    environment:
-      DB_VENDOR: POSTGRES
-      DB_ADDR: postgres
-      DB_DATABASE: keycloak
-      DB_USER: kogito-user
-      DB_SCHEMA: public
-      DB_PASSWORD: kogito-pass
-      KEYCLOAK_USER: admin
-      KEYCLOAK_PASSWORD: admin
-      KEYCLOAK_IMPORT: /tmp/kogito-realm.json
-
   data-index:
     container_name: data-index
     image: 
docker.io/apache/incubator-kie-kogito-data-index-postgresql:${KOGITO_VERSION}
@@ -158,26 +135,3 @@ services:
       QUARKUS_PROFILE: events-support
       QUARKUS_HTTP_PORT: 8580
       QUARKUS_HTTP_CORS_ORIGINS: "/.*/"
-
-  management-console:
-    container_name: management-console
-    image: 
docker.io/apache/incubator-kie-kogito-management-console:${KOGITO_VERSION}
-    ports:
-      - "8280:8080"
-    depends_on:
-      data-index:
-        condition: service_started
-      jobs-service:
-        condition: service_started
-      keycloak:
-        condition: service_healthy
-    volumes:
-      - ../target/classes/META-INF/processSVG/:/home/kogito/data/svg/
-    environment:
-      RUNTIME_TOOLS_MANAGEMENT_CONSOLE_KOGITO_ENV_MODE: "PROD"
-      RUNTIME_TOOLS_MANAGEMENT_CONSOLE_DATA_INDEX_ENDPOINT: 
http://127.0.0.1:8180/graphql
-      KOGITO_CONSOLES_KEYCLOAK_HEALTH_CHECK_URL: 
http://localhost:8480/auth/realms/kogito/.well-known/openid-configuration
-      KOGITO_CONSOLES_KEYCLOAK_URL: http://localhost:8480/auth
-      KOGITO_CONSOLES_KEYCLOAK_REALM: kogito
-      KOGITO_CONSOLES_KEYCLOAK_CLIENT_ID: kogito-console-quarkus
-
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/infinispan/infinispan.xml
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/infinispan/infinispan.xml
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/infinispan/infinispan.xml
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/infinispan/infinispan.xml
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/pgadmin/pgpass
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/pgadmin/pgpass
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/pgadmin/pgpass
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/pgadmin/pgpass
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/pgadmin/servers.json
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/pgadmin/servers.json
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/pgadmin/servers.json
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/pgadmin/servers.json
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/sql/init.sql
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/sql/init.sql
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/sql/init.sql
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/sql/init.sql
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/startServices.sh
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/startServices.sh
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docker-compose/startServices.sh
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docker-compose/startServices.sh
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Process-with-job.png
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docs/images/Process-with-job.png
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/Process-with-job.png
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docs/images/Process-with-job.png
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/services.png
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/docs/images/services.png
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/docs/images/services.png
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/docs/images/services.png
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/pom.xml 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/pom.xml
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/pom.xml
rename to kogito-quarkus-examples/process-usertasks-timer-quarkus/pom.xml
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/java/org/kie/kogito/hr/Candidate.java
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/java/org/kie/kogito/hr/Candidate.java
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/java/org/kie/kogito/hr/Candidate.java
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/java/org/kie/kogito/hr/Candidate.java
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/META-INF/processSVG/hiring.svg
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/META-INF/processSVG/hiring.svg
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/META-INF/processSVG/hiring.svg
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/META-INF/processSVG/hiring.svg
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/META-INF/resources/index.html
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/META-INF/resources/index.html
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/META-INF/resources/index.html
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/META-INF/resources/index.html
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/application.properties
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/application.properties
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/application.properties
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/application.properties
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/hiring.bpmn
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/hiring.bpmn
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/main/resources/hiring.bpmn
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/main/resources/hiring.bpmn
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/test/java/org/kie/kogito/hr/HiringProcessIT.java
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/test/java/org/kie/kogito/hr/HiringProcessIT.java
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/test/java/org/kie/kogito/hr/HiringProcessIT.java
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/test/java/org/kie/kogito/hr/HiringProcessIT.java
diff --git 
a/kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/test/resources/application.properties
 
b/kogito-quarkus-examples/process-usertasks-timer-quarkus/src/test/resources/application.properties
similarity index 100%
rename from 
kogito-quarkus-examples/process-usertasks-timer-quarkus-with-console/src/test/resources/application.properties
rename to 
kogito-quarkus-examples/process-usertasks-timer-quarkus/src/test/resources/application.properties


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to