Skip to content

Commit 4edd8ee

Browse files
committed
remove bash on scripts
1 parent c9ea402 commit 4edd8ee

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

authentication/AzureAD/README_WITH_PRIVATE_KEY_JWT.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ For additional information regarding the implement in Liberty, please refer to t
5757
The expiration is set to 1000 days:
5858

5959
```shell
60-
$ openssl req -x509 -nodes -days 1000 -newkey rsa:2048 -keyout myodmcompany.key \
60+
openssl req -x509 -nodes -days 1000 -newkey rsa:2048 -keyout myodmcompany.key \
6161
-out myodmcompany.crt -subj "/CN=myodmcompany.com/OU=it/O=myodmcompany/L=Paris/C=FR" \
6262
-addext "subjectAltName = DNS:myodmcompany.com"
6363
```
@@ -242,7 +242,7 @@ For additional information regarding the implement in Liberty, please refer to t
242242
```shell
243243
helm search repo ibm-odm-prod
244244
NAME CHART VERSION APP VERSION DESCRIPTION
245-
ibm-helm/ibm-odm-prod 24.0.0 9.0.0.0 IBM Operational Decision Manager
245+
ibm-helm/ibm-odm-prod 24.1.0 9.0.0.1 IBM Operational Decision Manager
246246
```
247247
248248
### Run the `helm install` command
@@ -426,7 +426,7 @@ As explained in the ODM on Certified Kubernetes documentation [Configuring user
426426
You can realize a basic authentication ODM runtime call the following way:
427427

428428
```shell
429-
$ curl -H "Content-Type: application/json" -k --data @payload.json \
429+
curl -H "Content-Type: application/json" -k --data @payload.json \
430430
-H "Authorization: Basic b2RtQWRtaW46b2RtQWRtaW4=" \
431431
https://<DS_RUNTIME_HOST>/DecisionService/rest/production_deployment/1.0/loan_validation_production/1.0
432432
```
@@ -438,7 +438,7 @@ But if you want to execute a bearer authentication ODM runtime call using the Cl
438438
Before to generate the client_assertion, you need a keystore.jks that will be build using the previously generated myodmcompany.key private key and myodmcompany.crt public key PEM files with the commands:
439439

440440
```shell
441-
$ openssl pkcs12 -export -out myodmcompany.p12 -inkey myodmcompany.key -in myodmcompany.crt -passout pass:changeme
441+
openssl pkcs12 -export -out myodmcompany.p12 -inkey myodmcompany.key -in myodmcompany.crt -passout pass:changeme
442442
keytool -importkeystore -srckeystore myodmcompany.p12 -srcstoretype pkcs12 -srcalias 1 -srcstorepass changeme -destkeystore myodmcompany.jks -deststoretype jks -deststorepass changeme -destalias myalias
443443
```
444444

@@ -451,15 +451,15 @@ java -cp $DCLIB/jrules-teamserver.jar:$DCLIB/jose4j-0.9.3.jar:$DCLIB/slf4j-api-1
451451
Now, generate the access token using the client_assertion:
452452

453453
```shell
454-
$ curl -k -X POST -H "Content-Type: application/x-www-form-urlencoded" \
454+
curl -k -X POST -H "Content-Type: application/x-www-form-urlencoded" \
455455
-d 'client_id=<CLIENT_ID>&scope=<CLIENT_ID>%2F.default&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&client_assertion=<CLIENT_ASSERTION>&grant_type=client_credentials' \
456456
'https://login.microsoftonline.com/<TENANT_ID>/oauth2/v2.0/token'
457457
```
458458

459459
And use the retrieved access token in the following way:
460460

461461
```shell
462-
$ curl -H "Content-Type: application/json" -k --data @payload.json \
462+
curl -H "Content-Type: application/json" -k --data @payload.json \
463463
-H "Authorization: Bearer <ACCESS_TOKEN>" \
464464
https://<DS_RUNTIME_HOST>/DecisionService/rest/production_deployment/1.0/loan_validation_production/1.0
465465
```

0 commit comments

Comments
 (0)