Skip to content

Commit 611eeb8

Browse files
committed
mvn release with cognito
1 parent 730614a commit 611eeb8

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ In pom.xml,
2626
<dependency>
2727
<groupId>io.kafkaesque.pulsar</groupId>
2828
<artifactId>pulsar-client-plugin</artifactId>
29-
<version>0.0.6</version>
29+
<version>0.0.7</version>
3030
</dependency>
3131

3232
```
@@ -53,11 +53,11 @@ PulsarClient client = PulsarClient.builder()
5353
```
5454

5555
### AWS Cognito integration
56-
Integration of AWS Cognito enables Pulsar client authenticated against [AWS Cognito](https://aws.amazon.com/cognito/). The authentication flow requires creation of Cognito user pool and App client. The App client must allow `Client credential` OAuth flow, and specifies custome scopes for OAuth 2.0 grants. Here is [a good example](https://lobster1234.github.io/2018/05/31/server-to-server-auth-with-amazon-cognito/) explaining machine to machine authentication with Cognito.
56+
Integration of AWS Cognito enables Pulsar client authenticated against [AWS Cognito](https://aws.amazon.com/cognito/). The authentication flow requires creation of Cognito user pool and App client. The App client must allow `Client credential` OAuth flow, and specify custome scopes for OAuth 2.0 grants. Here is [a good example](https://lobster1234.github.io/2018/05/31/server-to-server-auth-with-amazon-cognito/) explaining machine to machine authentication with Cognito.
5757

5858
The client plugin enables client credential to exchange an access token following [the Cognito deverloper's guide](https://docs.aws.amazon.com/cognito/latest/developerguide/token-endpoint.html). Under the hood, we will use `client_credentials` as grant_type. Scope must be preconfigured under the a User Pool's resource server and enabled by checking off `App client`'s OAuth2 Allowed Custom Scopes. This can be done via AWS CLI or console. The scope name will be used for authorization.
5959

60-
Resource server's identifier and client Id, that becomes `sub` in the Cognito JWT, can be optionally used for verification on the Pulsar broker side's authentication.
60+
Resource server's identifier and client Id, that becomes `sub` in the Cognito JWT, can be used for whitelist verification on the Pulsar broker side's authentication.
6161

6262
Cognito integration consists of the client side plugin and a broker auth plugin. The client plugin generates an access token, which in turn can be authenticated and authorized by the broker side. The broker plugin has to be configured on Pulsar and is not part of this repo. Please contact [Kafkaesque](https://kafkaesque.io/contact/#) to enable the broker side plugin.
6363

java/pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
<groupId>io.kafkaesque.pulsar</groupId>
44
<artifactId>pulsar-client-plugin</artifactId>
55
<packaging>jar</packaging>
6-
<version>0.0.6</version>
6+
<version>0.0.7</version>
77

88

99
<name>pulsar-client-plugin</name>

0 commit comments

Comments
 (0)