Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 8248af9

Browse files
Update docs to reflect that oauth2 proxy is ready
1 parent 993ffbc commit 8248af9

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,9 @@ If you want to understand the details of how to configure RabbitMQ with Oauth2 g
3333
- [Use Rich Authorization Request Tokens](#use-rich-authorization-request-tokens)
3434
- Use different OAuth 2.0 servers
3535
- [KeyCloak](use-cases/keycloak.md)
36-
- [https://auth0.com/](use-cases/auth0.md)
36+
- [Auth0](use-cases/auth0.md)
3737
- [Azure Active Directory](use-cases/azure.md)
38-
- [Oauth2 proxy](use-cases/oauth2-proxy.md) **Coming soon. Not releesed yet**
38+
- [OAuth2 Proxy](use-cases/oauth2-proxy.md)
3939
- [Understand the environment](#understand-the-environment)
4040
- [RabbitMQ server](#rabbitmq-server)
4141
- [UAA server](#uaa-server)
@@ -138,7 +138,7 @@ To configure RabbitMQ Management UI with OAuth 2.0 you need the following config
138138
Alike Service-Provider initiated logon, with Idp-initiated logon users land to RabbitMQ management ui with a valid token.
139139
These two scenarios below are examples of Idp-initiated logon:
140140

141-
* RabbitMQ is behind a web portal which conveniently allow users to navigate directly to RabbitMQ fully authenticated
141+
* RabbitMQ is behind a web portal which conveniently allow users to navigate directly to RabbitMQ management ui already authenticated
142142
* There is an OAuth2 proxy in between users and RabbitMQ which intercepts their requests and forwards them to RabbitMQ injecting the token into the HTTP `Authorization` header
143143

144144
The latter scenario is demonstrated [here](oauth2-examples-proxy.html). The former scenario is covered in the following section.

0 commit comments

Comments
 (0)