tyk_analytics.conf
and make sure that a proper oauth_redirect_uri_separator
parameter is set. You may use the following value:
tyk_analytics.conf
:
tyk.conf
, this will instruct the gateway to skip SSL verification when the JWT middleware is in use, particularly when JWKS are retrieved from your IDP:
.well-known/openid-configuration
endpoint of your OpenID Connect Provider metadata. Please see the OpenID spec for further information."sub"
and for Policy Field Name use "pol"
.
https://keycloak:8443/
Client Registration Endpoint: OpenID Connect client registration endpoint. This value is found in your well-known discovery document as registration_endpoint
. The well-known location URL is typically https://keycloak:8443/.well-known/openid-configuration
Initial Registration Access Token: the token that’s used to register new clients, this was generated in the early steps of the guide.
https://keycloak:8443/auth/realms/master/protocol/openid-connect/token
Your Postman request should contain the following body, where "client_id"
and "client_secret"
are the credentials you got from the developer portal:
"access_token"
and use it to access our Keycloak API, this request will be proxied by Tyk: