-
Notifications
You must be signed in to change notification settings - Fork 94
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #615 from bstansberry/pulls
Pulls
- Loading branch information
Showing
4 changed files
with
22 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
11 changes: 11 additions & 0 deletions
11
_posts/2024-05-06-caching-realm-update-of-credentials.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
--- | ||
layout: post | ||
title: 'Caching realm now automatically tries to authenticate users with the underlying realm if authentication with cached credentials fails' | ||
date: 2024-05-06 | ||
tags: elytron security caching realm credentials authentication | ||
author: dvilkola | ||
synopsis: Learn how the Caching Realm can now update outdated credentials. | ||
link: https://wildfly-security.github.io/wildfly-elytron/blog/caching-security-realm-authenticate-with-underlying-realm-on-failure/ | ||
--- | ||
|
||
WildFly provides a caching security realm that allows you to cache the results of a credential lookup from a security realm. WildFly 32+ will automatically attempt to verify credentials with the underlying realm if an authentication fails with the cached credentials. If this authentication succeeds, the obsolete credential is replaced with the updated credential. This functionality is useful if the credentials have been updated externally of WildFly. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
--- | ||
layout: post | ||
title: 'Dynamic client SSL context that automatically delegates to different SSLContexts based on the host and port of the peer' | ||
date: 2024-05-07 | ||
tags: elytron dynamic client ssl context | ||
author: dvilkola | ||
synopsis: Learn about the new Dynamic Client SSL Context feature. | ||
link: https://wildfly-security.github.io/wildfly-elytron/blog/dynamic-client-ssl-context/ | ||
--- | ||
|
||
WildFly 32 introduces the ability to configure a dynamic client SSL context. The dynamic client SSL context will dynamically switch between different SSL contexts based on the host and port of the peer. The host and port rules can be specified in the authentication context. This blog post demonstrates how to use this new resource. |
This file was deleted.
Oops, something went wrong.