IIB/IBM应用程序Connect-使用Oauthbearer的Kafka SASL连接

发布于 2025-02-07 03:02:12 字数 2945 浏览 3 评论 0原文

在使用OAuthBearer连接IBM应用程序连接到KAFKA时,我面临问题。 以下是卡夫卡团队提供的属性。

ssl.truststore.location=/abc/config/kafka/ssl/client.truststore.jks
ssl.truststore.password=changeme
sasl.server.callback.handler.class=aero.sita.bordermanagement.eventbus.authentication.ClientAuthenticateCallbackHandler
sasl.mechanism=OAUTHBEARER
sasl.jaas.config=org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule required sasl.oauthbearer.token.endpoint.url="https://testserver:443/openam/oauth2/realms/root/realms/ptd-portal-security/access_token" oauth.token.grant.type="password" client.id="servicesSecurityClient" client.secret="abc@1234" username="SITRISKASSESSMENTSYSTEMUSER" password="abc@1234";

我要低于错误,

 Caused by: javax.security.auth.login.LoginException: An internal error occurred while retrieving token from callback handler
2022-06-13 19:49:27.335     59  at org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule.identifyToken(OAuthBearerLoginModule.java:319)
2022-06-13 19:49:27.335     59  at org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule.login(OAuthBearerLoginModule.java:301)
2022-06-13 19:49:27.336     59  at sun.reflect.GeneratedMethodAccessor5.invoke(Unknown Source)
2022-06-13 19:49:27.336     59  at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:55)
2022-06-13 19:49:27.336     59  at java.lang.reflect.Method.invoke(Method.java:508)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext.invoke(LoginContext.java:788)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext.access$000(LoginContext.java:196)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext$5.run(LoginContext.java:721)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext$5.run(LoginContext.java:719)
2022-06-13 19:49:27.336     59  at java.security.AccessController.doPrivileged(AccessController.java:770)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext.invokeCreatorPriv(LoginContext.java:719)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext.login(LoginContext.java:593)
2022-06-13 19:49:27.336     59  at org.apache.kafka.common.security.oauthbearer.internals.expiring.ExpiringCredentialRefreshingLogin.login(ExpiringCredentialRefreshingLogin.java:204)
2022-06-13 19:49:27.336     59  at org.apache.kafka.common.security.oauthbearer.internals.OAuthBearerRefreshingLogin.login(OAuthBearerRefreshingLogin.java:150)
2022-06-13 19:49:27.337     59  at org.apache.kafka.common.security.authenticator.LoginManager.<init>(LoginManager.java:62)
2022-06-13 19:49:27.337     59  at org.apache.kafka.common.security.authenticator.LoginManager.acquireLoginManager(LoginManager.java:105)
2022-06-13 19:49:27.337     59  at org.apache.kafka.common.network.SaslChannelBuilder.configure(SaslChannelBuilder.java:158)

I am facing issue while connecting IBM app connect to kafka through SASL connection using OAUTHBEARER.
Below are the property provided by the kafka team.

ssl.truststore.location=/abc/config/kafka/ssl/client.truststore.jks
ssl.truststore.password=changeme
sasl.server.callback.handler.class=aero.sita.bordermanagement.eventbus.authentication.ClientAuthenticateCallbackHandler
sasl.mechanism=OAUTHBEARER
sasl.jaas.config=org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule required sasl.oauthbearer.token.endpoint.url="https://testserver:443/openam/oauth2/realms/root/realms/ptd-portal-security/access_token" oauth.token.grant.type="password" client.id="servicesSecurityClient" client.secret="abc@1234" username="SITRISKASSESSMENTSYSTEMUSER" password="abc@1234";

I am getting below error,

 Caused by: javax.security.auth.login.LoginException: An internal error occurred while retrieving token from callback handler
2022-06-13 19:49:27.335     59  at org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule.identifyToken(OAuthBearerLoginModule.java:319)
2022-06-13 19:49:27.335     59  at org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule.login(OAuthBearerLoginModule.java:301)
2022-06-13 19:49:27.336     59  at sun.reflect.GeneratedMethodAccessor5.invoke(Unknown Source)
2022-06-13 19:49:27.336     59  at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:55)
2022-06-13 19:49:27.336     59  at java.lang.reflect.Method.invoke(Method.java:508)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext.invoke(LoginContext.java:788)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext.access$000(LoginContext.java:196)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext$5.run(LoginContext.java:721)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext$5.run(LoginContext.java:719)
2022-06-13 19:49:27.336     59  at java.security.AccessController.doPrivileged(AccessController.java:770)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext.invokeCreatorPriv(LoginContext.java:719)
2022-06-13 19:49:27.336     59  at javax.security.auth.login.LoginContext.login(LoginContext.java:593)
2022-06-13 19:49:27.336     59  at org.apache.kafka.common.security.oauthbearer.internals.expiring.ExpiringCredentialRefreshingLogin.login(ExpiringCredentialRefreshingLogin.java:204)
2022-06-13 19:49:27.336     59  at org.apache.kafka.common.security.oauthbearer.internals.OAuthBearerRefreshingLogin.login(OAuthBearerRefreshingLogin.java:150)
2022-06-13 19:49:27.337     59  at org.apache.kafka.common.security.authenticator.LoginManager.<init>(LoginManager.java:62)
2022-06-13 19:49:27.337     59  at org.apache.kafka.common.security.authenticator.LoginManager.acquireLoginManager(LoginManager.java:105)
2022-06-13 19:49:27.337     59  at org.apache.kafka.common.network.SaslChannelBuilder.configure(SaslChannelBuilder.java:158)

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文