From e86071e26be0fb93a64ea645ec84d16cb127c587 Mon Sep 17 00:00:00 2001 From: Thibault Vallin Date: Mon, 13 Nov 2023 20:02:54 +0100 Subject: [PATCH] 4.x: Docs - fix Security http basic authentication property (#7987) Signed-off-by: tvallin --- docs/includes/security/providers/http-basic-auth.adoc | 4 ++-- docs/includes/security/providers/http-digest-auth.adoc | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/includes/security/providers/http-basic-auth.adoc b/docs/includes/security/providers/http-basic-auth.adoc index 7c14afb8d96..26691c230da 100644 --- a/docs/includes/security/providers/http-basic-auth.adoc +++ b/docs/includes/security/providers/http-basic-auth.adoc @@ -89,8 +89,8 @@ Subject is created based on the username and roles provided by the user store. When identity propagation is configured, there are several options for identifying username and password to propagate: 1. We propagate the current username and password (inbound request must be authenticated using basic authentication). -2. We use username and password from an explicitly configured property (See `HttpBasicAuthProvider.EP_PROPERTY_OUTBOUND_USER` - and `HttpBasicAuthProvider.EP_PROPERTY_OUTBOUND_PASSWORD`) +2. We use username and password from an explicitly configured property (See `EndpointConfig.PROPERTY_OUTBOUND_ID` + and `EndpointConfig.PROPERTY_OUTBOUND_SECRET`) 3. We use username and password associated with an outbound target (see example configuration above) Identity is propagated only if: diff --git a/docs/includes/security/providers/http-digest-auth.adoc b/docs/includes/security/providers/http-digest-auth.adoc index 88db728295c..e9bfd4ad91c 100644 --- a/docs/includes/security/providers/http-digest-auth.adoc +++ b/docs/includes/security/providers/http-digest-auth.adoc @@ -1,6 +1,6 @@ /////////////////////////////////////////////////////////////////////////////// - Copyright (c) 2018, 2022 Oracle and/or its affiliates. + Copyright (c) 2018, 2023 Oracle and/or its affiliates. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. @@ -78,7 +78,7 @@ Java service loader service `io.helidon.security.providers.httpauth.spi.UserStor users to the provider, such as when validated against an internal database or LDAP server. The user store is defined so you never need the clear text password of the user. -_Note on security of HTTP Digest Authenticaton_ +_Note on security of HTTP Digest Authentication_ These authentication schemes should be _obsolete_, though they provide a very easy way to test a protected resource.