io.micronaut.*
-
"micronaut.security.jwks"
-
"micronaut.security.openid-configuration"
-
public static final boolean
true
"micronaut.security.basic-auth"
-
public static final boolean
true
"/"
"/"
"/"
public static final boolean
false
"micronaut.security.redirect"
-
public static final boolean
true
"/"
-
public static final boolean
true
"/"
-
public static final boolean
true
"/"
-
"0.0.0.0"
public static final boolean
true
public static final boolean
true
public static final boolean
true
"micronaut.security"
-
"micronaut.security.csrf"
-
public static final boolean
true
"/login"
"micronaut.security.endpoints.login"
-
public static final boolean
true
public static final boolean
false
"/logout"
"micronaut.security.endpoints.logout"
-
public static final boolean
true
public static final boolean
true
"/oauth/access_token"
"micronaut.security.endpoints.oauth"
-
"grant_type"
"refresh_token"
-
"aud"
"client_id"
"exp"
"iat"
"iss"
"jti"
"nbf"
"scope"
"sub"
"token_type"
"username"
-
public static final boolean
true
"/token_info"
"micronaut.security.endpoints.introspection"
-
"error"
"error_description"
"error_uri"
"state"
-
public static final boolean
true
"micronaut.security.filter"
-
public static final boolean
true
"micronaut.security.ldap"
-
"micronaut.security.ldap.context"
-
public static final boolean
false
"micronaut.security.ldap.groups"
-
"micronaut.security.ldap.search"
-
-
true
"Authorization"
"Bearer"
-
-
public static final boolean
true
-
public static final boolean
true
-
public static final boolean
true
"micronaut.security.oauth2"
-
"micronaut.security.oauth2.openid"
-
"micronaut.security.oauth2.openid.additional-claims"
-
"micronaut.security.oauth2.openid.claims-validation"
-
"client_secret_basic"
"client_secret_jwt"
"client_secret_post"
"none"
"private_key_jwt"
"tls_client_auth"
-
public static final boolean
true
"cookie"
"session"
"micronaut.security.oauth2.pkce"
-
-
-
"micronaut.security.oauth2.pkce.cookie"
-
"client_id"
"code_challenge"
"code_challenge_method"
"redirect_uri"
"response_type"
"scope"
"state"
-
"acr_values"
"display"
"id_token_hint"
"login_hint"
"max_age"
"nonce"
"prompt"
"response_mode"
"ui_locales"
-
public static final boolean
true
"micronaut.security.oauth2.state"
-
"micronaut.security.oauth2.state.cookie"
-
public static final boolean
true
"cookie"
"cookie"
"session"
"micronaut.security.oauth2.openid.nonce"
-
"micronaut.security.oauth2.openid.nonce.cookie"
-
io.micronaut.security.oauth2.endpoint.token.response.Address
"country"
"locality"
"postal_code"
"region"
"street_address"
-
"accessToken"
"oauth2Provider"
"refreshToken"
-
-
io.micronaut.security.oauth2.endpoint.token.response.OpenIdClaims
"acr"
"address"
"amr"
"auth_time"
"azp"
"birthdate"
"email"
"email_verified"
"family_name"
"gender"
"given_name"
"locale"
"middle_name"
"name"
"nickname"
"nonce"
"phone_number"
"phone_number_verified"
"picture"
"preferred_username"
"profile"
"updated_at"
"website"
"zoneinfo"
-
-
"client_id"
"client_secret"
-
io.micronaut.security.oauth2.keycloak.docker.Keycloak
"myclient"
"http://host.testcontainers.internal"
"http://localhost"
"testcontainers"
"password"
"test"
-
"denyAll()"
"isAnonymous()"
"isAuthenticated()"
-
"For security purposes, sensitive endpoints are disabled until you supply your own replacement for SensitiveEndpointRule::checkSensitiveAuthenticated, eg:\n\n@Singleton\n@Replaces(SensitiveEndpointRule.class)\nclass SensitiveEndpointRuleReplacement extends SensitiveEndpointRule {\n\n SensitiveEndpointRuleReplacement(EndpointSensitivityProcessor endpointSensitivityProcessor) {\n super(endpointSensitivityProcessor);\n }\n\n @Override\n @NonNull\n protected Publisher<SecurityRuleResult> checkSensitiveAuthenticated(@NonNull HttpRequest<?> request,\n @NonNull Authentication authentication,\n @NonNull ExecutableMethod<?, ?> method) {\n return Mono.just(authentication.getRoles().contains(\"ADMIN\") ? SecurityRuleResult.ALLOWED : SecurityRuleResult.REJECTED);\n }\n}\n"
-
public static final boolean
true
"micronaut.security.session"
-
"micronaut.security.sessionid-resolver"
-
io.micronaut.security.token.Claims
"aud"
"exp"
"iat"
"iss"
"kid"
"nbf"
"sub"
"jti"
-
public static final boolean
true
"micronaut.security.token.bearer"
-
-
public static final boolean
true
"micronaut.security.token"
-
public static final boolean
true
-
"JWT_REFRESH_TOKEN"
"/oauth/access_token"
public static final boolean
true
"micronaut.security.token.refresh.cookie"
-
"JWT"
"/"
public static final boolean
true
"micronaut.security.token.cookie"
-
public static final int
3600
"micronaut.security.token.generator.access-token"
-
public static final boolean
true
"micronaut.security.token.jwt"
-
public static final boolean
true
"/keys"
"micronaut.security.endpoints.keys"
-
public static final boolean
false
public static final boolean
true
"micronaut.security.token.jwt.generator.refresh-token"
-
public static final int
60
"micronaut.security.token.jwt.signatures.jwks"
-
"micronaut.security.token.jwt.signatures.jwks-static"
-
"micronaut.security.token.jwt.claims-validators.issuer"
-
public static final boolean
true
public static final boolean
true
public static final boolean
false
public static final boolean
true
public static final boolean
true
"micronaut.security.token.jwt.claims-validators"
-
"micronaut.security.token.jwt.claims-validators.not-before"
-
true
"micronaut.security.token.propagation.header"
-
public static final boolean
false
"/**"
"micronaut.security.token.propagation"
-
public static final boolean
false
"CN=(.*?)(?:,|$)"
"micronaut.security.x509"