OIDC subsystem credential secret not mapped

16 views
Skip to first unread message

Naresh Shrestha

unread,
Mar 16, 2026, 7:07:31 PM (5 days ago) Mar 16
to WildFly
Hi community, 

I tried embedding elytron-oidc-client with the following configuration:
/subsystem=elytron-oidc-client/provider=kinde-provider:add(provider-url="myProviderUrl", ssl-required=EXTERNAL)

/subsystem=elytron-oidc-client/secure-deployment="myApp.war":add(provider=kinde-provider, client-id="myClientId", credential={secret="mySecret"}, principal-attribute=preferred_username, autodetect-bearer-only=true)


everything is fine but credential is not holding the value secret="mySecret"
<credential name="secret"/>
the outcome I need :
<credential name="secret" secret="mySecret"/>
Is there any settings that I need to enable for this to work?

Best Regards,
Naresh Shrestha

Naresh Shrestha

unread,
Mar 16, 2026, 11:47:38 PM (5 days ago) Mar 16
to WildFly
Got the answer:
credential must be added after creating secure-deployment:

/subsystem=elytron-oidc-client/provider=kinde-provider:add(provider-url="${env.KINDE_DOMAIN}", ssl-required=EXTERNAL)
/subsystem=elytron-oidc-client/secure-deployment="myApp.war":add(provider=kinde-provider, client-id="${env.KINDE_CLIENT_ID}", principal-attribute=preferred_username, autodetect-bearer-only=true)
/subsystem=elytron-oidc-client/secure-deployment=" myApp  .war"/credential=secret:add(secret="${env.KINDE_CLIENT_SECRET}")
Reply all
Reply to author
Forward
0 new messages