[keycloak-dev] configuring social providers

Marko Strukelj mstrukel at redhat.com
Mon Jul 22 09:13:12 EDT 2013


When using Google+ SignIn or Facebook SignIn or Twitter SignIn I always get redirected to an authorization form where now there would say something like:

Application _Keycloak_ wants access to your email, and a list of friends.

Instead of saying:

Application _SocialDemo_ wants access to your email ...


Me as a user I don't know anything about Keycloak. I came to the web site of SocialDemo. When I see that Keycloak wants access to my email, phishing alarms go off in my head ...



----- Original Message -----
> 
> 
> On 7/22/2013 8:28 AM, Bolesław Dawidowicz wrote:
> > On 07/22/2013 02:12 PM, Bill Burke wrote:
> >>
> >>
> >> On 7/22/2013 7:48 AM, Bolesław Dawidowicz wrote:
> >>> The whole concept of the broker for social stuff is built around two
> >>> points:
> >>>
> >>> a) Application developer doesn't care about configuration of G+,
> >>> twitter, FB, linkedIn and etc. at the app code level. He just does it
> >>> single time in the management console for his app(s). Then he just
> >>> interacts with broke/keycloak APIs. If there is new social provider
> >>> added and configured via management console - it just appears in the app
> >>> login screen. From application code perspective this is pretty much
> >>> transparent. Important point is that those social services cannot be
> >>> preconfigured as you cannot share key secret publicly
> >>>
> >>
> >> Nothing you have said has convinced me you CAN'T use a global keycloak
> >> google account.  Login will be a double OAuth invocation.  Redirects
> >> will be Application->Keycloak->Google->Keycloak->Application.
> >>
> >> This is a usability issue.  If we go the IdentityBroker route, a
> >> keycloak user would have to register and create a social account for
> >> each social provider they want to enable.  If a new social becomes
> >> popular, they won't automatically get this new provider, they will again
> >> have to register for an account and configure keycloak.
> >
> > Yes but then you just do it once for the whole set of your applications.
> > 3 clicks in the management UI, filling in 3 text forms. Then your N
> > applications that are configured with KC/Broker automagically obtain
> > support for this new social provider
> 
> Again, this is a huge usability issue.  A lot of time consuming
> configuration to enable social media login.
> 
> >>
> >> I'd like to see just one checkbox "Enable Social Login".  When the admin
> >> checks this, they get everything we can integrate with or will be able
> >> to integrate with.  Simple easy....
> >
> > Doesn't you need to register KeyCloak with Google first and obtain
> > secret that cannot be share therefore cannot be configured in KC OOTB?
> 
> What is OOTB? Out of the box?
> 
> I'm not understanding you.  Maybe we're misunderstanding each other?
> The Keycloak SaaS would be set up and installed by us, Red Hat.  So we
> would register Keycloak with Google/Twitter/etc and pre-configure
> Keycloak SaaS when we launch it.
> 
> The OOTB, downloadable appliance would require the admin to set up the
> global social accounts and configure the appliance before starting it up.
> 
> But what I don't want is that each Realm created on a Keycloak server to
> have to setup these social accounts.
> 
> > Our point is that you cannot have global Google/Twitter/etc. KeyCloak
> > developer account provided and configured by default - it would violate
> > certain set of terms and conditions defined by those providers.
> >
> 
> You need to be more specific: These providers have terms and conditions
> that prevent third parties from becoming a *true* broker?  And they will
> disable Keycloak's account?
> 
> For example, Googles terms and services says nothing that prevents us
> from having a global Keycloak account:
> 
> http://www.google.com/intl/en/policies/terms
> 
> 
> >>
> >>> b) Application User doesn't need to be aware about about existence of
> >>> keycloak/broker. From the user perspective he is interacting only with
> >>> the app and social providers (g+, twitter, etc.).
> >>>
> >>
> >> Incorrect.  For the OAuth case, Keycloak will be specifying messages
> >> like "Application XXX is requesting permission to access your
> >> inventory."  Google only does OAuth for Google apps, AFAICT.
> >>
> >> For single-sign-on, users will be redirected to Keycloak.  If there is a
> >> keycloak session cookie set, then no social login is required, but the
> >> 2nd application the user visits still needs to obtain a token.
> >
> > I think we are a bit lost in the conversation and are talking about a
> > bit different things and flows. Did you try to follow the Getting
> > Started for the POC that Stian shared?
> >
> 
> I thought you stated that users won't be aware of keycloak and will just
> see the keycloak login screen and google login screen.  This is
> incorrect. Each keycloak realm will have its own notions of Oauth scope
> and "acting on behalf of" beyond what Google et. al. can provide.
> 
> 
> --
> Bill Burke
> JBoss, a division of Red Hat
> http://bill.burkecentral.com
> _______________________________________________
> keycloak-dev mailing list
> keycloak-dev at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-dev
> 



More information about the keycloak-dev mailing list