Skip to content

Commit 4a84ea1

Browse files
MarcialRosalesmichaelklishin
authored andcommitted
Apply recommendations
1 parent 64a9e30 commit 4a84ea1

File tree

1 file changed

+2
-5
lines changed

1 file changed

+2
-5
lines changed

site/management.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -295,11 +295,8 @@ against the OAuth 2 server, this must be configured separately. Currently,
295295
* [Auth0](https://auth0.com/)
296296
* [Azure](https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/auth-oauth2)
297297

298-
**IMPORTANT**: In OAuth 2.0 terms, RabbitMQ management UI is a **public app** which
299-
means it cannot securely store credentials such as `client_secret`. Your authorization server must allow you
300-
to configure the oauth client as **public app**. This means that RabbitMQ does not need to present a client_secret
301-
when authenticating/authorizing users. If your authorization server only supports **confidential app**, or
302-
simply it always requires `client_secret`, only then you have to configure one via the `oauth_client_secret` setting.
298+
**IMPORTANT**: : In OAuth 2.0, the RabbitMQ Management UI is a **public app** which
299+
means it cannot securely store credentials such as the *client_secret*. This means that RabbitMQ does not need to present a client_secret when authenticating users. You must be able to configure the OAuth client as a **public app** with the authorization server that you are using. If your authorization server only supports a **confidential app** or it requires a *client_secret*, then you must configure a *client_secret* using the `oauth_client_secret` setting.
303300

304301
To redirect users to the UAA server to authenticate, use the following configuration:
305302

0 commit comments

Comments
 (0)