Defender can be configured to work with any OpenID-compliant STS. By default, we use Keycloak.
Notes for AWS Cognito: Make sure to set a "Domain Name" or you will get cryptic errors!
- Access the application at https://localhost:8000
- User registration is enabled by default. Simply click the Login link and sign up.
- The Admin console is available at http://localhost:9080/auth and the credentials are
admin
/admin
- No Secret Key
- Leave all the other defaults and make note of the Client ID
- Make sure to check the proper Identity Provider
- Callback URL(s) = http://localhost, http://localhost/assets/silent-renew.html
- Sign Out URL(s) = http://localhost
- Allowed OAuth Flows = Authorization Code Grant
- Allowed OAuth Scopes = openid email profile
- Docker Desktop
- Docker Compose
- NodeJS >= 12.x
- OpenJDK 11
- Maven >= 3
If you wish to work on the API and the Frontend, run the following docker-compose
command to start the STS:
docker-compose up -d authdb keycloak
- Navigate to
defender-client/
and runnpm install
- Navigate to
defender-api/
and runmvn clean install
- To start angular-cli, from
defender-client/
runnpm run start
- To start Spring Boot run the Java mian method
- The app will be available at
http://localhost:4200/
- Keycloak can be configured at
http://localhost:9080/auth/admin/
- Make sure docker and docker-compose are installed
- In the root, run
docker-compose up -d --build
To start everything