From 9e51049f906acbf1562956bf822c964937a66835 Mon Sep 17 00:00:00 2001 From: Diana Krepinska Date: Tue, 7 May 2024 10:10:23 +0200 Subject: [PATCH 1/3] Add a blog post link about dynamic client SSL context --- _posts/2024-05-07-dynamic-client-ssl-context.adoc | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 _posts/2024-05-07-dynamic-client-ssl-context.adoc diff --git a/_posts/2024-05-07-dynamic-client-ssl-context.adoc b/_posts/2024-05-07-dynamic-client-ssl-context.adoc new file mode 100644 index 000000000..c9865e21f --- /dev/null +++ b/_posts/2024-05-07-dynamic-client-ssl-context.adoc @@ -0,0 +1,11 @@ +--- +layout: post +title: 'Dynamic client SSL context that automatically delegates to different SSLContexts based on the host and port of the peer' +date: 2024-05-07 +tags: elytron dynamic client ssl context +author: dvilkola +synopsis: Learn about the new Dynamic Client SSL Context feature. +link: https://wildfly-security.github.io/wildfly-elytron/blog/dynamic-client-ssl-context/ +--- + +WildFly 32 introduces the ability to configure a dynamic client SSL context. The dynamic client SSL context will dynamically switch between different SSL contexts based on the host and port of the peer. The host and port rules can be specified in the authentication context. This blog post demonstrates how to use this new resource. From fa748212ff1ab461e72204159756ef048c809d31 Mon Sep 17 00:00:00 2001 From: Diana Krepinska Date: Mon, 6 May 2024 21:53:07 +0200 Subject: [PATCH 2/3] Add a blog on how caching realm can now update obsolete credentials --- ...024-05-06-caching-realm-update-of-credentials.adoc | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 _posts/2024-05-06-caching-realm-update-of-credentials.adoc diff --git a/_posts/2024-05-06-caching-realm-update-of-credentials.adoc b/_posts/2024-05-06-caching-realm-update-of-credentials.adoc new file mode 100644 index 000000000..02e0e7289 --- /dev/null +++ b/_posts/2024-05-06-caching-realm-update-of-credentials.adoc @@ -0,0 +1,11 @@ +--- +layout: post +title: 'Caching realm now automatically tries to authenticate users with the underlying realm if authentication with cached credentials fails' +date: 2024-05-06 +tags: elytron security caching realm credentials authentication +author: dvilkola +synopsis: Learn how the Caching Realm can now update outdated credentials. +link: https://wildfly-security.github.io/wildfly-elytron/blog/caching-security-realm-authenticate-with-underlying-realm-on-failure/ +--- + +WildFly provides a caching security realm that allows you to cache the results of a credential lookup from a security realm. WildFly 32+ will automatically attempt to verify credentials with the underlying realm if an authentication fails with the cached credentials. If this authentication succeeds, the obsolete credential is replaced with the updated credential. This functionality is useful if the credentials have been updated externally of WildFly. From 16571e9eee1741800c92fbd0fe6095fe4e7aaa7a Mon Sep 17 00:00:00 2001 From: James Cobb Date: Tue, 7 May 2024 16:18:19 -0500 Subject: [PATCH 3/3] Matomo POC closing, remove code --- _layouts/base.html | 2 -- assets/javascript/tracking.js | 8 -------- 2 files changed, 10 deletions(-) delete mode 100644 assets/javascript/tracking.js diff --git a/_layouts/base.html b/_layouts/base.html index 364b934ee..24ea1f2ba 100644 --- a/_layouts/base.html +++ b/_layouts/base.html @@ -24,8 +24,6 @@ gtag('config', 'UA-40221748-1'); - - {% if page.link %} diff --git a/assets/javascript/tracking.js b/assets/javascript/tracking.js deleted file mode 100644 index 3c288a12b..000000000 --- a/assets/javascript/tracking.js +++ /dev/null @@ -1,8 +0,0 @@ -var idSite = 5; -var matomoTrackingApiUrl = 'https://analytics.ossupstream.org/matomo.php'; - -var _paq = window._paq = window._paq || []; -_paq.push(['setTrackerUrl', matomoTrackingApiUrl]); -_paq.push(['setSiteId', idSite]); -_paq.push(['trackPageView']); -_paq.push(['enableLinkTracking']); \ No newline at end of file