[ 
https://issues.apache.org/jira/browse/JCLOUDS-838?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14348743#comment-14348743
 ] 

Ignasi Barrera commented on JCLOUDS-838:
----------------------------------------

While the API does not implement another authentication mechanism than HTTPS 
client auth, a possible workaround would be to use a custom KeyManager (an 
in-memory one, for example), and configure the KeyStore to use it.

This gist contains a working example using the Azure SDK, but could easily be 
adapted and extended to work with jclouds.
https://gist.github.com/nacx/a78b0dbe246d38814adb

> Avoid deprecation
> -----------------
>
>                 Key: JCLOUDS-838
>                 URL: https://issues.apache.org/jira/browse/JCLOUDS-838
>             Project: jclouds
>          Issue Type: Sub-task
>          Components: jclouds-compute, jclouds-labs
>            Reporter: Francesco Chicchiriccò
>             Fix For: 2.0.0
>
>
> Two classes are marked as {{@Deprecated}} but still used:
>  * {{KeyStoreSupplier}}
>  * {{SSLContextWithKeysSupplier}}
> The TODO comment on top of both says
> {quote}
> this code needs to be completely refactored. It needs to stop using KeyStore 
> of at all possible and definitely the local filesystem. Please look at oauth 
> for examples on how to do this via PEMs.
> {quote}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to