[keycloak-dev] implement JPA model

Bill Burke bburke at redhat.com
Mon Nov 4 10:46:02 EST 2013



On 11/4/2013 10:13 AM, Anil Saldhana wrote:
> On 11/04/2013 03:45 AM, Bolesław Dawidowicz wrote:
>> On 11/01/2013 04:17 PM, Anil Saldhana wrote:
>>> Bill,
>>>       this is just a cop out.
>>>
>>> You very well know this is just going to create more headache
>>> if ever KeyCloak is integrated into Wildfly. :)
>>>
>>> In future versions of WF (starting WF9), we want to make use of PL IDM
>>> for the user stores across the subsystems. That is the reason we are
>>> implementing a JDBC store implementation in addition to the JPA store when
>>> a database is involved.
>> How are you going to handle store implementation compatibility? JPA one
>> exposes great deal of flexibility by letting you to map your own
>> entities and shaping the model. I assume JDBC implementation will be
>> much more constrained and enforcing the model? I wonder what are the
>> odds that two applications reuse same identity store implementation if
>> they go beyond very basic schema.
>>
>> Going along this line... benefit for KC would be to integrate with IDM
>> storage that is already in place - JDBC one that you are implementing
>> would be natural fit to integrate with WF. Would be good to know the
>> limitations in advance to adapt.
> JDBC implementation is mainly for deeper WF integration. So if we
> standardize on PicketLink IDM across WF, then KeyCloak can reuse it
> to provide uniform dev experience.
>

The problem with Picketlink IDM is that it is not a security solution. 
It is a general purpose persistence solution.  You're basically 
reinventing JDO/Hibernate, and, honestly, are repeating and fixing the 
same mistakes that were made with those solutions years and years and 
years ago...

You can't really have a uniform dev experience beyond user/credentials 
because well, Keycloak and other technologies have a lot more metadata 
that needs to be stored beyond the simplistic OOTB WF security model.

>   From a standalone KC perspective, I think it makes sense to
> integrate with PL IDM, to reuse across app servers/runtimes. The IDM
> API is pretty standardized across the teams here
> while the implementation (file, JPA, JDBC,LDAP) can be plugged in.

The current Resteasy OAuth solution can use any security domain defined 
in AS7 and EAP6.x.  We'll want to do something similar with Keycloak so 
that it can be deployed as a solution in existing AS7, EAP6, WF8, and 
EAP7 environments.  We're not waiting for Picketlink IDM to come on line 
and be integrated with WF9 and EAP8.

-- 
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com


More information about the keycloak-dev mailing list