<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Wed, Jan 6, 2016 at 11:11 AM, Marek Posolda <span dir="ltr"><<a href="mailto:mposolda@redhat.com" target="_blank">mposolda@redhat.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor="#FFFFFF" text="#000000">
<div>Not sure, I am like 50/50 . I agree it
can simplify some scenarios when KeycloakDeployment is accessible
from KeycloakSecurityContext. On the other hand,
KeycloakDeployment exposes some info, which is not necessary to be
exposed in client apps. <br></div></div></blockquote><div><br></div><div>I haven't really studied the details of KeycloakDeployment, but was under the impression that it just holds the data from keycloak.json with the addition of some client related info obtained from Keycloak. Is there anything that needs to be hidden from the client especially if the client can still obtain the object through RefreshableKeycloakSecurityContext?</div><div><br></div><div>What I was interested in was the accountUrl and resourceName so that I can provide a link to users to change their password. </div><div> <br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div bgcolor="#FFFFFF" text="#000000"><div>I think you can just cast KeycloakSecurityContext to
RefreshableKeycloakSecurityContext and get KeycloakDeployment from
there?<br></div></div></blockquote><div><br></div><div>That's what I'm doing now, but I think it's more of a hack than a real solution.</div><div><br></div></div>
</div><div class="gmail_extra">Best regards,</div><div class="gmail_extra">Thomas</div></div>