You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@pulsar.apache.org by "Anonymitaet (via GitHub)" <gi...@apache.org> on 2023/05/08 01:23:17 UTC

[GitHub] [pulsar-site] Anonymitaet commented on a diff in pull request #557: Improve OIDC client authentication docs

Anonymitaet commented on code in PR #557:
URL: https://github.com/apache/pulsar-site/pull/557#discussion_r1186953702


##########
docs/security-openid-connect.md:
##########
@@ -131,4 +131,4 @@ In order to simplify migration from Static JWTs to OIDC Authentication, it is po
 
 ## Configure OIDC authentication in Pulsar Clients and CLI Tools
 
-See the [OAuth2](security-oauth2.md) documentation for configuring clients to use OAuth2 authentication.
+The Pulsar OAuth2 client plugin can be used to for clients that rely on the Client Credentials Flow for OIDC. See the [OAuth2 Client](security-oauth2.md#configure-oauth2-authentication-in-pulsar-clients) documentation for configuring clients to integrate with Pulsar Servers running with the OIDC Authentication Provider.

Review Comment:
   ```suggestion
   The Pulsar OAuth2 client plugin can be used for clients that rely on the Client Credentials Flow for OIDC. For how to configure clients to integrate with Pulsar Servers running with the OIDC Authentication Provider, see the [OAuth2 Client](security-oauth2.md#configure-oauth2-authentication-in-pulsar-clients).
   ```



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscribe@pulsar.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org