This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch trunk
in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git

commit 836b55ef78dd46acb39aea55503407354a62f125
Author: Jacques Le Roux <jacques.le.r...@les7arts.com>
AuthorDate: Thu Feb 8 11:21:59 2024 +0100

    Fixed: Fix trunk documentation generation in BuidBot (OFBIZ-12896)
    
    It's a weird mess, maybe I miss something :/
    Some same includes links that works well in 18.12 branch don't in trunk. I 
thought it could be due to java version but not even since I see that in the 
18.12 build:
    
        To honour the JVM settings for this build a new JVM will be forked.
        > Task :deleteOfbizDocumentation
        > Task :generateOfbizDocumentation
        unsupported Java version "11", defaulting to 1.7
        BUILD SUCCESSFUL in 55s
        2 actionable tasks: 2 executed
---
 .../webapp/src/docs/asciidoc/_include/wa-cross-domains-SSO.adoc     | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git 
a/framework/webapp/src/docs/asciidoc/_include/wa-cross-domains-SSO.adoc 
b/framework/webapp/src/docs/asciidoc/_include/wa-cross-domains-SSO.adoc
index b5d76ea7f1..77361b1f4d 100644
--- a/framework/webapp/src/docs/asciidoc/_include/wa-cross-domains-SSO.adoc
+++ b/framework/webapp/src/docs/asciidoc/_include/wa-cross-domains-SSO.adoc
@@ -23,8 +23,8 @@ under the License.
 As more explained at bottom of 
https://issues.apache.org/jira/browse/OFBIZ-11594, the introduction of "the 
SameSite attribute set to 'strict' for all cookies"
 with https://issues.apache.org/jira/browse/OFBIZ-11470 prevents the internal 
Single Sign On feature.
 
-There are ways to make it available as explained at bottom of 
https://issues.apache.org/jira/browse/OFBIZ-11594. It's not implemented OOTB
-
+There are ways to make it available as explained at bottom of 
https://issues.apache.org/jira/browse/OFBIZ-11594.
+It's not implemented OOTB
 ====
 
 
@@ -68,6 +68,8 @@ webappName.securedLoginId cookie, creates a JWT containing 
the userLoginId, and
 . Then the sendJWT() Ajax function sends an Authorization header containing 
the JWT to the URL to reach.
 At this stage, if all things are correct, the flow leaves the source side.
 
+. *Last but not least*. To make this work you have to set the 
security.internal.sso.enabled and security.token.key SystemProperty entities 
locally and on trunk demo server
+
 .On the server side:
 . A CORS policy is needed. _Without it, the Authorization token containing the 
JWT will be rejected.
 It's a simple policy but you need to strictly define the authorized domains. 
Never use the lazy "*" for domains

Reply via email to