[keycloak-dev] Issue with latest Github master and SAML IDP providers?

Stian Thorgersen stian at redhat.com
Tue Mar 17 05:00:57 EDT 2015



----- Original Message -----
> From: "Guy Davis" <guydavis.ca at gmail.com>
> To: "Stian Thorgersen" <stian at redhat.com>
> Cc: keycloak-dev at lists.jboss.org
> Sent: Sunday, March 15, 2015 2:17:19 AM
> Subject: Re: [keycloak-dev] Issue with latest Github master and SAML IDP providers?
> 
> Hi Stian,
> 
> I tried the following using the very latest Github master.
> 
>    1. Keycloak appliance (built in distribution folder so Wildfly 8.2).
>    Had a problem:
>       1. Doesn't list SAML or Open ID Connect in the Identity Providers
>       picklist like previous versions.  Please see screenshot
> attached.  Did the
>       IdP choice get moved?

Seems like there's a bug, I'll look at this now

>       2. Deploying Keycloak into a JBoss EAP 6.3 (from Teiid 8.10).  Had
>    following errors:
>       1. Failed deployment due to lack of org.bouncycastle module.  Not
>       part of JBoss 6 Adapter?  bcprov and bcpix are in
>       auth-server.war/WEB-INF/lib, but something is trying to load it
> as a module.
>       2. After adding a org.bouncycastle module manually using the bc 1.50
>       jars, I got a resteasy-crypto module missing error.  If I add that I
>       get
>       conflicts between resteasy-2.3.8 in JBoss EAP and resteasy 3
> that provides
>       resteasy-crypto.
> 
> So, I'm struggling to see the best way forward.  I need to remain
> compatible with Teiid which is tied to JBoss EAP, not Wildfly.  As well,
> our app is still geared toward JBoss EAP 6.1.0alpha (aka JBoss AS 7).
> Keycloak indicates adapters for WF, EAP, and AS 7 are all supported.  I was
> able to demo Identity Brokering just two weeks ago successfully on AS7
> (6.1.0alpha), so this is a recent change on master.
> 
> Please advise on the best path forward.  A key benefit of Keycloak over
> other IDP/SSO options was that it could exist in the same JBoss container
> as our other apps and frameworks.
> 
> Thanks,
> Guy
> 
> 
> On Thu, Mar 12, 2015 at 11:50 PM, Stian Thorgersen <stian at redhat.com> wrote:
> 
> > I assume this happens after you've clicked on 'PicketLink IDP' on the
> > login screen?
> >
> > Can you try the same with the appliance download? We don't support JBoss
> > EAP 6.1.0alpha, so maybe that's the problem.
> >
> > ----- Original Message -----
> > > From: "Guy Davis" <guydavis.ca at gmail.com>
> > > To: "Stian Thorgersen" <stian at redhat.com>
> > > Cc: keycloak-dev at lists.jboss.org
> > > Sent: Thursday, March 12, 2015 7:52:00 PM
> > > Subject: Re: [keycloak-dev] Issue with latest Github master and SAML IDP
> > providers?
> > >
> > > Hi Stian,
> > >
> > > Thanks for the response.  Yes, I'm still seeing this issue with the very
> > > latest Github master (including today's commit #1038).  This was working
> > > for me a couple of weeks ago, before more recent commits.  We demoed the
> > > identity broker to our management using a PicketLink test idp.war (in
> > same
> > > container) and also using MS WAAD on Azure.  It's a key feature for us.
> > >
> > > Let me provide more details about my environment:
> > >
> > >    1. Building/running with Java 1.7
> > >    2. Building master with 'mvn clean install -DskipTests=true
> > >    -Pdistribution'
> > >    3. Running within a JBoss EAP 6.1.0alpha container using the modules
> > >    from distribution\as7-adapter-zip\target\unpacked in
> > >    my ApplicationServer\modules\system\layers\base with the following
> > >    differences:
> > >       1. Had to add 'org/bouncycastle/main/bcprov-jdk16-1.46.jar'
> > otherwise
> > >       Keycloak complained on startup in server.log.
> > >       2. Had to remove 'org/jboss/as' and 'org/jboss/aesh' as they were
> > >       overwriting older JBoss EAP 6.1.0alpha versions and preventing
> > startup.
> > >    4. Deploying the auth-server.war by zipping the contents and renaming
> > >    'auth.war', placing in my standalone/deployments folder.
> > >    5. Updating the standalone.xml file with the required Keycloak config.
> > >    Defining the realm and secure deployments in that XML directly.
> > >    6. Starting with a missing H2 datasource to ensure old data/schema is
> > >    not the problem.  On startup, I confirm admin's password and then
> > re-build
> > >    my DSIS realm.
> > >
> > > Any help you can provide would be most appreciated.  I'm using the
> > Keycloak
> > > master as features being added now such as Kerberos/Spnego and Identity
> > > Brokering are critical use cases for our adoption.
> > >
> > > Thanks,
> > > Guy
> > >
> > >
> > > On Thu, Mar 12, 2015 at 3:49 AM, Stian Thorgersen <stian at redhat.com>
> > wrote:
> > >
> > > > Are you still having issues or did you figure it out?
> > > >
> > > > ----- Original Message -----
> > > > > From: "Guy Davis" <guydavis.ca at gmail.com>
> > > > > To: keycloak-dev at lists.jboss.org
> > > > > Sent: Wednesday, 4 March, 2015 1:10:52 AM
> > > > > Subject: [keycloak-dev] Issue with latest Github master and SAML IDP
> > > > providers?
> > > > >
> > > > > Good day,
> > > > >
> > > > > I've been using a sample Picketlink IDP locally for testing the SAML
> > > > v2.0 ID
> > > > > brokering, however after updating to latest master and re-deploying
> > > > > components, I'm getting the following error. Any tips?
> > > > >
> > > > >
> > > > >
> > > > > Thanks in advance,
> > > > > Guy
> > > > >
> > > > > _______________________________________________
> > > > > keycloak-dev mailing list
> > > > > keycloak-dev at lists.jboss.org
> > > > > https://lists.jboss.org/mailman/listinfo/keycloak-dev
> > > >
> > >
> >
> 


More information about the keycloak-dev mailing list