security oauth2 client show
-
PDF of this doc site

Collection of separate PDF docs
Creating your file...
Display OAuth 2.0 Provider
Availability: This command is available to cluster administrators at the admin privilege level.
Description
The security oauth2 client show
command displays the configured OAuth 2.0 Provider configuration.
Parameters
- {
[-fields <fieldname>,…]
-
This specifies the fields that need to be displayed.
- |
[-instance ]
} -
If this parameter is specified, the command displays information about all OAuth 2.0 configuration entries.
[-config-name <text>]
- Configuration Entry Name-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified config-name.
[-application <OAuth 2.0 Applications>]
- Application-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified application. Currently only the
http
application is supported. [-issuer {scheme://(hostname|IPv4 Address|'['IPv6 Address']')…}]
- OAuth 2.0 Issuer-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified issuer.
[-audience <text>]
- OAuth 2.0 Audience-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified audience.
[-client-id <text>]
- OAuth 2.0 Client ID-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified client-id.
[-hashed-client-secret <Hex String>]
- Hashed representation of client secret-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified hashed-client-secret.
[-introspection-endpoint {scheme://(hostname|IPv4 Address|'['IPv6 Address']')…}]
- OAuth 2.0 Token Introspection Endpoint Location-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified introspection-endpoint.
[-introspection-interval {P[<integer>D]T[<integer>H][<integer>M][<integer>S] | P<integer>W | disabled}]
- OAuth 2.0 Token Introspection Refresh Interval in ISO-8601 format-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified introspection-interval.
[-remote-user-claim <text>]
- OAuth 2.0 Remote User Claim-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified remote-user-claim.
[-provider-jwks-uri {scheme://(hostname|IPv4 Address|'['IPv6 Address']')…}]
- OAuth 2.0 Provider JSON Web Key Set Location-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified provider-jwks-uri.
[-jwks-refresh-interval {P[<integer>D]T[<integer>H][<integer>M][<integer>S] | P<integer>W}]
- OAuth 2.0 JSON Web Key Set Refresh Interval in ISO-8601 format-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified jwks-refresh-interval.
[-outgoing-proxy <text>]
- OAuth 2.0 Outgoing Proxy To Access External IdPs-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified outgoing-proxy.
[-use-local-roles-if-present {true|false}]
- Use Local Roles, If Present-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified use-local-roles-if-present.
[-use-mutual-tls {none|request|required}]
- Mutual TLS enforcement-
This is the Mutual TLS setting for the OAuth 2.0 configuration. When set to
required
, OAuth 2.0 mutual TLS authentication is enforced for all access tokens and any token that does not have x5t#S256 property in the cnf section is rejected. The default value isrequest
when not set, which means OAuth 2.0 mutual TLS authentication is enforced only if the x5t#S256 property is present in the cnf section of the access token. This can be disabled by setting to valuenone
. [-provider {basic|keycloak|auth0|adfs|entra}]
- OAuth 2.0 Provider-
If this parameter is specified, the command displays information only about the OAuth 2.0 configuration that match the specified Identity Provider.
Examples
The following example displays the OAuth 2.0 Provider configuration for Local Validation:
cluster1::> security oidc client show Configuration Name: auth1 Application: http Issuer: https://issuer.example.com/ Audience: - Client ID: - Hashed Client Secret: - Introspection Endpoint: - Introspection Refresh Interval : - Use local roles: true Provider JSON Web Key Set Location: https://issuer.example.com/.well-known/jwks.json JSON Web Key Set Refresh Interval: 1h Remote User Claim: preferred_username Outgoing Proxy: https://outgoing_proxy Mutual TLS enforcement: request Provider: basic
The following example displays the OAuth 2.0 Provider configuration for Remote Introspection:
cluster1::> security oidc client show Configuration Name: auth1 Application: http Issuer: https://issuer.example.com/ Audience: - Client ID: client_id Hashed Client Secret: e194e3472ee55c4202582cfbf59a03a37ef27085d2baf1b2fd7f7da3973c56fa Introspection Endpoint: - Introspection Refresh Interval : 0s Use local roles: true Provider JSON Web Key Set Location: - JSON Web Key Set Refresh Interval: - Remote User Claim: preferred_username Outgoing Proxy: https://outgoing_proxy Mutual TLS enforcement: required Provider: basic