Skip to content

fixes #2109 update basic, apikey and simple web token security handle… #2110

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Feb 8, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion api-key/src/main/resources/config/apikey.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# ApiKey Authentication Security Configuration for light-4j
# Enable ApiKey Authentication Handler, default is false.
enabled: ${apikey.enabled:false}
enabled: ${apikey.enabled:true}
# If API key hash is enabled. The API key will be hashed with PBKDF2WithHmacSHA1 before it is
# stored in the config file. It is more secure than put the encrypted key into the config file.
# The default value is false. If you want to enable it, you need to use the following repo
Expand Down
2 changes: 1 addition & 1 deletion basic-auth/src/main/resources/config/basic-auth.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# Basic Authentication Security Configuration for light-4j
---
# Enable Basic Authentication Handler, default is false.
enabled: ${basic.enabled:false}
enabled: ${basic.enabled:true}
# Enable Ldap Authentication, default is true.
enableAD: ${basic.enableAD:true}
# Do we allow the anonymous to pass the authentication and limit it with some paths
Expand Down
2 changes: 1 addition & 1 deletion security-config/src/main/resources/config/security.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ enableVerifyJwt: ${security.enableVerifyJwt:true}
# if this flag is false. It should only be set to false on the dev environment for testing
# purposes. If you have some endpoints that want to skip the SWT verification, you can put the
# request path prefix in skipPathPrefixes.
enableVerifySwt: ${security.enableVerifySwt:false}
enableVerifySwt: ${security.enableVerifySwt:true}

# swt clientId header name. When light-gateway is used and the consumer app does not want to save
# the client secret in the configuration file, it can be passed in the header.
Expand Down