jenskeiner commented on a change in pull request #3308:
URL: https://github.com/apache/apisix/pull/3308#discussion_r561729833



##########
File path: doc/plugins/authz-keycloak.md
##########
@@ -38,24 +38,37 @@ For more information on Keycloak, refer to [Keycloak 
Authorization Docs](https:/
 
 ## Attributes
 
-| Name                    | Type          | Requirement | Default              
                         | Valid                                                
              | Description                                                     
                                                                                
            |
-| ----------------------- | ------------- | ----------- | 
--------------------------------------------- | 
------------------------------------------------------------------ | 
-----------------------------------------------------------------------------------------------------------------------------------------------------------
 |
-| discovery               | string        | optional    |                      
                         | 
https://host.domain/auth/realms/foo/.well-known/uma2-configuration | URL to 
discovery document for Keycloak Authorization Services.                         
                                                                     |
-| token_endpoint          | string        | optional    |                      
                         | 
https://host.domain/auth/realms/foo/protocol/openid-connect/token  | A 
OAuth2-compliant Token Endpoint that supports the 
`urn:ietf:params:oauth:grant-type:uma-ticket` grant type. Overrides value from 
discovery, if given.     |
-| grant_type              | string        | optional    | 
"urn:ietf:params:oauth:grant-type:uma-ticket" | 
["urn:ietf:params:oauth:grant-type:uma-ticket"]                    |            
                                                                                
                                                                 |
-| audience                | string        | optional    |                      
                         |                                                      
              | The client identifier of the resource server to which the 
client is seeking access. <br>This parameter is mandatory when parameter 
permission is defined.   |
-| permissions             | array[string] | optional    |                      
                         |                                                      
              | A string representing a set of one or more resources and scopes 
the client is seeking access.  The format of the string must be: 
`RESOURCE_ID#SCOPE_ID`.    |
-| timeout                 | integer       | optional    | 3000                 
                         | [1000, ...]                                          
              | Timeout(ms) for the http connection with the Identity Server.   
                                                                                
            |
-| ssl_verify              | boolean       | optional    | true                 
                         |                                                      
              | Verify if SSL cert matches hostname.                            
                                                                                
            |
-| policy_enforcement_mode | string        | optional    | "ENFORCING"          
                         | ["ENFORCING", "PERMISSIVE"]                          
              |                                                                 
                                                                                
            |
-
-### Endpoints
-
-Endpoints can optionally be discovered by providing a URL pointing to 
Keycloak's discovery document for Authorization Services for the realm
-in the `discovery` attribute. The token endpoint URL will then be determined 
from that document. Alternatively, the token endpoint can be
-specified explicitly via the `token_endpoint` attribute.
-
-One of `discovery` and `token_endpoint` has to be set. If both are given, the 
value from `token_endpoint` is used.
+| Name                           | Type          | Requirement | Default       
                                | Valid                                         
                     | Description                                              
                                                                                
                   |
+| ------------------------------ | ------------- | ----------- | 
--------------------------------------------- | 
------------------------------------------------------------------ | 
-----------------------------------------------------------------------------------------------------------------------------------------------------------
 |
+| discovery                      | string        | optional    |               
                                | 
https://host.domain/auth/realms/foo/.well-known/uma2-configuration | URL to 
discovery document for Keycloak Authorization Services.                         
                                                                     |
+| token_endpoint                 | string        | optional    |               
                                | 
https://host.domain/auth/realms/foo/protocol/openid-connect/token  | A 
OAuth2-compliant Token Endpoint that supports the 
`urn:ietf:params:oauth:grant-type:uma-ticket` grant type. Overrides value from 
discovery, if given.     |
+| resource_registration_endpoint | string        | optional    |               
                                | 
https://host.domain/auth/realms/foo/authz/protection/resource_set  | A Keycloak 
Protection API-compliant resource registration endpoint. Overrides value from 
discovery, if given.                                               |
+| grant_type                     | string        | optional    | 
"urn:ietf:params:oauth:grant-type:uma-ticket" | 
["urn:ietf:params:oauth:grant-type:uma-ticket"]                    |            
                                                                                
                                                                 |
+| client_id                      | string        | required    |               
                                |                                               
                     | The client identifier of the resource server to which 
the client is seeking access. <br>This parameter is mandatory when parameter 
permission is defined.   |
+| client_secret                  | string        | optional    |               
                                |                                               
                     | The client secret, if required.                          
                                                                                
                   |
+| policy_enforcement_mode        | string        | optional    | "ENFORCING"   
                                | ["ENFORCING", "PERMISSIVE"]                   
                     |                                                          
                                                                                
                   |
+| permissions                    | array[string] | optional    |               
                                |                                               
                     | Static permission to request, an array of strings each 
representing a resources and optionally one or more scopes the client is 
seeking access.             |
+| lazy_load_paths                | boolean       | optional    | false         
                                |                                               
                     | Dynamically resolve the request URI to resource(s) using 
the resource registration endpoint instead of using the static permission.      
                   |
+| http_method_as_scope           | boolean       | optional    | false         
                                |                                               
                     | Map HTTP request type to scope of same name and add to 
all permissions requested.                                                      
                     |

Review comment:
       Added.




----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to