You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have keycloak codecentric helm chart deployed and keycloak version is 25.0.0 and its up and running. I want to connect springboot application with keycloak.
But i am getting the following error
Couldn't retrieve remote JWK set: org.springframework.web.client.ResourceAccessException: I/O error on GET request for "https://example.com/auth/realms/RELAM_NAME/protocol/openid-connect/certs": PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
My application.yaml configurations for keycloak are as follows:
I have keycloak codecentric helm chart deployed and keycloak version is 25.0.0 and its up and running. I want to connect springboot application with keycloak.
But i am getting the following error
Couldn't retrieve remote JWK set: org.springframework.web.client.ResourceAccessException: I/O error on GET request for "https://example.com/auth/realms/RELAM_NAME/protocol/openid-connect/certs": PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
My application.yaml configurations for keycloak are as follows:
keycloak:
jwk-set-uri: https://example.com/auth/realms/REALM_NAME/protocol/openid-connect/certs
auth-server-url: https://example.com
keycloak-tenants:
auth-server-url: https://example.com
realms:
- CLI_ADMIN:
realm: REL_NAME
resource: CLI_ADMIN
principal-attribute:
admin-cli: false
client-secret: M
order: 1
- CLI_MASTER:
realm:
resource:
principal-attribute:
admin-cli: false
client-secret:
order: 2
security:
jwt:
issuers:
- https://example.com/auth/realms/REALM_NAME
- https://example.com/auth/realms/REALM_NAME
and values.yaml for code centric helm charts is as follows
command:
extraEnv: |
value: admin
value: admin
value: >-
-Djgroups.dns.query={{ include "keycloak.fullname" . }}-headless
-Dkeycloak.hostname=example.com
-Dkeycloak.proxy=forward
value: "false"
value: "/auth"
value: kubernetes
value: edge
value: "true"
value: example.com
value: "true"
value: "true"
value: "true"
value: "example.com"
value: "true"
value: "true"
Any help on this would be highly appreciated.
The text was updated successfully, but these errors were encountered: