I have Solr 8.1 installed, and I have this sample JWT
HEADER:ALGORITHM & TOKEN TYPE { "alg": "HS256", "typ": "JWT" }
PAYLOAD:DATA
{ "sub": "1234567890", "name": "John Doe", "iat": 1516239022 }
The secret key is "your-256-bit-secret"
Which generates the encoded JWT of
eyJhbGciOiJIUzI1NiIsInR5cCI
ff45b5",
> "alg" : "HS256", "k" : "FdFYFzERwC2uCBB46pZQi4GG85LujR8obt-KWRBICVQ" }
>
> Of course you need to find a way to encode your particular secret in jwk
> format, there should be plenty of tools available for that. If you intend to
> use symmetric key in prod you have to configure solr so that security.json is
> not readable for anyone but the admin!
>
> Jan Høydahl
>
>> 9. sep. 2019 kl. 05:46 skrev Tyrone :
>>
>> HS256
arts of Solr. So just dropping in the jars will not work.
>
> I’d encourage you to upgrade to 8.x
>
> Jan Høydahl
>
>> 13. sep. 2019 kl. 19:54 skrev Tyrone Tse :
>>
>> I only copied the 2 jars
>>
>> -
>>
>> jwt-auth-1.0.0.jar
>>
19, 2019, at 10:16 PM, Tyrone Tse wrote:
>>
>> I finally got JWT Authentication working on Solr 8.1.1.
>> This is my security.json file contents
>> {
>> "authentication":{
>> "class":"solr.JWTAuthPlugin",
>&
I am using Solr 8.5 cloud, and in my collection I have edited the
solrconfig.xml file to use
1000
and commented out the default configuration
We are using SolrJ to post files to the Solr here is the snippet of Java
code that does it
try(HttpSolrClient solrClient = solr.build
up.setAction(AbstractUpdateRequest.ACTION.COMMIT, true, true);
Is this what you recommended I try.
Thanks
Tyrone
On Tue, Jul 21, 2020 at 1:16 PM Erick Erickson
wrote:
> What you’re seeing is the input from the client. You’ve passed true, true,
> which are waitFlush and waitSearcher
> w
down?
Currently in our Java application, if Solr 1 is going to brought down for
maintenance, then the our solr configuration file solr url property has to
be changed to from http://localhost:8983 to http://localhost:7574
Thanks
Tyrone
sing JWK with the JWT token. JWK is only for defining
> the key, see https://mkjwk.org for an online JWK generator, you can
> choose HS256 as algorithm. Put the generated JWK in Solr's config and also
> use the generated key to sign your JWT. Then Solr should be able to
> validate
Høydahl wrote:
> Please check the error message in solr.log on the server side and paste
> that here. Could be a bug 🕷
>
> Jan Høydahl
>
> > 10. sep. 2019 kl. 18:51 skrev Tyrone Tse :
> >
> > Jan using https://mkjwk.org/
> > I generated the following JWK
>
"alg": "HS256",
"typ": "JWT"
} Payload {
"sub": "admin",
"name": "admin",
"iat": 1516239022
} What other parameters do I need to add to the security.json file to
secure Solr 7.2 ? I don't want any
I am testing the JWT Auth plugin from
https://github.com/cominvent/solr-auth-jwt
as my project is using Solr 7.2.
I downloaded the master branch for the code, and I built the
jwt-auth-1.0.0.jar
with the mvn package command.
I then copied the jar to my $SOLR_HOME/lib/
I also downloaded the jose4
I only copied the 2 jars
-
jwt-auth-1.0.0.jar
-
jose4j-0.6.3.jar
to the $SOLR_HOME/lib folder, to install the code for the
https://github.com/cominvent/solr-auth-jwt plugin
On Fri, Sep 13, 2019 at 11:55 AM Shawn Heisey wrote:
> On 9/13/2019 10:30 AM, Tyrone Tse wrote:
>
cal.add(Calendar.MINUTE,60);
Date expDate = cal.getTime();
String jws = Jwts.builder().
setSubject("admin")
.setAudience("Solr")
.setExpiration(expDate)
.signWith(SignatureAl
Solr version 8.1.1
My schema
solconfig.xml
mySuggester
FreeTextLookupFactory
DocumentDictionaryFactory
suggest
3
text_en_splitting
false
tru
What's the command to build it
On Wed, Nov 6, 2019 at 3:06 PM Mikhail Khludnev wrote:
> Hello,
>
> Have you build suggester before requesting?
>
> On Wed, Nov 6, 2019 at 12:50 PM Tyrone Tse wrote:
>
> > Solr version 8.1.1
> >
> > My schema
>
2019 at 3:11 PM Tyrone Tse wrote:
> What's the command to build it
>
>
> On Wed, Nov 6, 2019 at 3:06 PM Mikhail Khludnev wrote:
>
>> Hello,
>>
>> Have you build suggester before requesting?
>>
>> On Wed, Nov 6, 2019 at 12:50 PM Tyrone Tse
16 matches
Mail list logo