<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px"><div><span></span></div><div id="yui_3_16_0_1_1423948566567_2593" dir="ltr">Bill - Just wanted to let you know the Identity Broker currently being built&nbsp;meets my requirements.&nbsp;I have successfully tested out a complex scenario (given below)&nbsp;involving both SPNEGO as well as SAML Service Provider functionality</div><div id="yui_3_16_0_1_1423948566567_2663" dir="ltr"><br></div><div id="yui_3_16_0_1_1423948566567_2671" dir="ltr">1) KC&nbsp; on two hosts acting as SAML IDP using SPNEGO as Identity Broker.</div><div id="yui_3_16_0_1_1423948566567_2707" dir="ltr">2) KC on another host acting as SAML SP communicating with IDP&nbsp;(Point 1)&nbsp;and a client using OpenID Connect (Point 3)</div><div id="yui_3_16_0_1_1423948566567_2758" dir="ltr">3) A Client application communicating with KC (refer to Point 2) using OpenID Connect</div><div id="yui_3_16_0_1_1423948566567_2759" dir="ltr"><br></div><div id="yui_3_16_0_1_1423948566567_3068" dir="ltr">Any user accessing the client application will now&nbsp;be seamlessly authenticated without entering password. Now I am looking for the "custom profiles" functionality which would help me move forward. Just to reiterate my requirement - once the user is authenticated, I would like to make a LDAP call (in some cases&nbsp;multiple calls to different repositories)&nbsp;to retrieve all user information that should eventually be populated in the SAML claims or OIDC id_token selectively. </div><div id="yui_3_16_0_1_1423948566567_3012" dir="ltr"><br></div><div id="yui_3_16_0_1_1423948566567_3013" dir="ltr">A big thank you to you and the entire dev team for accommodating our requests :-). Great Job!!!</div><div id="yui_3_16_0_1_1423948566567_2868" dir="ltr"><br></div><div id="yui_3_16_0_1_1423948566567_3191" dir="ltr">Regards,</div><div id="yui_3_16_0_1_1423948566567_3229" dir="ltr">Raghu<br></div><div id="yui_3_16_0_1_1423948566567_2564" style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;"> <div id="yui_3_16_0_1_1423948566567_2563" style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;"> <div id="yui_3_16_0_1_1423948566567_2592" dir="ltr"> <hr size="1" id="yui_3_16_0_1_1423948566567_2851">  <font id="yui_3_16_0_1_1423948566567_2633" face="Arial" size="2"> <b><span style="font-weight: bold;">From:</span></b> Raghu Prabhala &lt;prabhalar@yahoo.com&gt;<br> <b><span style="font-weight: bold;">To:</span></b> Bill Burke &lt;bburke@redhat.com&gt;; "keycloak-user@lists.jboss.org" &lt;keycloak-user@lists.jboss.org&gt; <br> <b><span style="font-weight: bold;">Sent:</span></b> Monday, February 9, 2015 8:13 AM<br> <b><span style="font-weight: bold;">Subject:</span></b> Re: [keycloak-user] Keycloak 1.1.0.Final Released<br> </font> </div> <div class="y_msg_container" id="yui_3_16_0_1_1423948566567_2562"><br><div id="yiv0228592185"><div id="yui_3_16_0_1_1423948566567_2561"><div id="yui_3_16_0_1_1423948566567_2560" style="color: rgb(0, 0, 0); font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px; background-color: rgb(255, 255, 255);"><div><span></span></div><div id="yiv0228592185yui_3_16_0_1_1423487107097_2892" dir="ltr">I think that would satisfy my requirements - but not sure until I see that bridge along with the&nbsp;Identity broker functionality in the next beta release - eagerly waiting for it.</div><div class="qtdSeparateBR"><br><br></div><div class="yiv0228592185yqt6182559582" id="yiv0228592185yqt76694"><div id="yiv0228592185yui_3_16_0_1_1423487107097_2881" style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;"> <div id="yiv0228592185yui_3_16_0_1_1423487107097_2880" style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;"> <div id="yiv0228592185yui_3_16_0_1_1423487107097_2879" dir="ltr"> <hr size="1" id="yiv0228592185yui_3_16_0_1_1423487107097_2894">  <font id="yiv0228592185yui_3_16_0_1_1423487107097_2878" face="Arial" size="2"> <b><span style="font-weight: bold;">From:</span></b> Bill Burke &lt;bburke@redhat.com&gt;<br clear="none"> <b><span style="font-weight: bold;">To:</span></b> keycloak-user@lists.jboss.org <br clear="none"> <b><span style="font-weight: bold;">Sent:</span></b> Friday, February 6, 2015 10:21 AM<br clear="none"> <b><span style="font-weight: bold;">Subject:</span></b> Re: [keycloak-user] Keycloak 1.1.0.Final Released<br clear="none"> </font> </div> <div class="yiv0228592185y_msg_container" id="yiv0228592185yui_3_16_0_1_1423487107097_2909"><br clear="none">Keycloak won't be a kerberos server any time soon, if ever.&nbsp; We are <br clear="none">creating a SAML/OIDC to kerberos bridge though.<br clear="none"><br clear="none">On 1/30/2015 10:52 AM, Raghu Prabhala wrote:<br clear="none">&gt; Unfortunately yes. Kerberos is deeply ingrained in most of internal applications/processes. While we can ask any new applications to use certificates, we have to support Kerberos.<br clear="none">&gt;<br clear="none">&gt; If that is not something that you will support, probably identity brokering would help. I can write a Kerberos broker as long as it is given control ( need http request) immediately by Keycloak, perhaps I can handle both authentication with key tabs (for system accts) as well as SPNEGO for users<br clear="none">&gt;<br clear="none">&gt; Sent from my iPhone<br clear="none">&gt;<br clear="none">&gt;&gt; On Jan 30, 2015, at 9:01 AM, Stian Thorgersen &lt;<a href="mailto:stian@redhat.com" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:stian@redhat.com">stian@redhat.com</a>&gt; wrote:<br clear="none">&gt;&gt;<br clear="none">&gt;&gt;<br clear="none">&gt;&gt;<br clear="none">&gt;&gt; ----- Original Message -----<br clear="none">&gt;&gt;&gt; From: "Raghu Prabhala" &lt;<a href="mailto:prabhalar@yahoo.com" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:prabhalar@yahoo.com">prabhalar@yahoo.com</a>&gt;<br clear="none">&gt;&gt;&gt; To: "Stian Thorgersen" &lt;<a href="mailto:stian@redhat.com" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:stian@redhat.com">stian@redhat.com</a>&gt;<br clear="none">&gt;&gt;&gt; Cc: "keycloak dev" &lt;<a href="mailto:keycloak-dev@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-dev@lists.jboss.org">keycloak-dev@lists.jboss.org</a>&gt;, "keycloak-user" &lt;<a href="mailto:keycloak-user@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a>&gt;<br clear="none">&gt;&gt;&gt; Sent: Friday, 30 January, 2015 2:44:14 PM<br clear="none">&gt;&gt;&gt; Subject: Re: [keycloak-user] Keycloak 1.1.0.Final Released<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt; Great. Looking forward to the 1.2 Beta version.<br clear="none">&gt;&gt;&gt; Regarding the system account support, from my perspective, it is very<br clear="none">&gt;&gt;&gt; important because we have thousands of applications that interact with each<br clear="none">&gt;&gt;&gt; other using system accounts (authentication with Kerberos with keytabs) and<br clear="none">&gt;&gt;&gt; till we have that functionality, we will not be able to consider Keycloak as<br clear="none">&gt;&gt;&gt; a SSO solution even though it is coming out to be a good product. The sooner<br clear="none">&gt;&gt;&gt; we have it, the better. Hopefully, even other users will pitch in to request<br clear="none">&gt;&gt;&gt; that functionality so that you can bump it up in your priority list.<br clear="none">&gt;&gt;&gt; Thanks once again.Raghu<br clear="none">&gt;&gt;<br clear="none">&gt;&gt; For your use-case would it have to be Kerberos? Only options we've been considering are certificates and jwt/jws.<br clear="none">&gt;&gt;<br clear="none">&gt;&gt;&gt;&nbsp; &nbsp; &nbsp; &nbsp;  From: Stian Thorgersen &lt;<a href="mailto:stian@redhat.com" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:stian@redhat.com">stian@redhat.com</a>&gt;<br clear="none">&gt;&gt;&gt; To: Raghu Prabhala &lt;<a href="mailto:prabhalar@yahoo.com" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:prabhalar@yahoo.com">prabhalar@yahoo.com</a>&gt;<br clear="none">&gt;&gt;&gt; Cc: keycloak dev &lt;<a href="mailto:keycloak-dev@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-dev@lists.jboss.org">keycloak-dev@lists.jboss.org</a>&gt;; keycloak-user<br clear="none">&gt;&gt;&gt; &lt;<a href="mailto:keycloak-user@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a>&gt;<br clear="none">&gt;&gt;&gt; Sent: Friday, January 30, 2015 2:10 AM<br clear="none">&gt;&gt;&gt; Subject: Re: [keycloak-user] Keycloak 1.1.0.Final Released<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt; ----- Original Message -----<br clear="none">&gt;&gt;&gt;&gt; From: "Raghu Prabhala" &lt;<a href="mailto:prabhalar@yahoo.com" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:prabhalar@yahoo.com">prabhalar@yahoo.com</a>&gt;<br clear="none">&gt;&gt;&gt;&gt; To: "Stian Thorgersen" &lt;<a href="mailto:stian@redhat.com" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:stian@redhat.com">stian@redhat.com</a>&gt;<br clear="none">&gt;&gt;&gt;&gt; Cc: "keycloak dev" &lt;<a href="mailto:keycloak-dev@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-dev@lists.jboss.org">keycloak-dev@lists.jboss.org</a>&gt;, "keycloak-user"<br clear="none">&gt;&gt;&gt;&gt; &lt;<a href="mailto:keycloak-user@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a>&gt;<br clear="none">&gt;&gt;&gt;&gt; Sent: Thursday, January 29, 2015 6:44:11 PM<br clear="none">&gt;&gt;&gt;&gt; Subject: Re: [keycloak-user] Keycloak 1.1.0.Final Released<br clear="none">&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt; Congrats Keycloak team. A great deal of features in this release - really<br clear="none">&gt;&gt;&gt;&gt; like SAML and clustering.<br clear="none">&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt; But what I am really looking for is the next release as we need all the<br clear="none">&gt;&gt;&gt;&gt; features you listed -any tentative dates for the beta version?<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt; We might do a beta soon, but that'll only include identity brokering. The<br clear="none">&gt;&gt;&gt; other features will be at least a month away.<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt; The functionality provided so far seems to be targeted toward users<br clear="none">&gt;&gt;&gt;&gt; accounts.<br clear="none">&gt;&gt;&gt;&gt; When can we expect support for System accounts (with diff auth mechanisms<br clear="none">&gt;&gt;&gt;&gt; like certificates, Kerberos etc?<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt; Some time this year we aim to have system accounts with certificates, it'll<br clear="none">&gt;&gt;&gt; depend on priorities. We don't have any plans to support Kerberos<br clear="none">&gt;&gt;&gt; authentication with system accounts, but maybe that makes sense to add as<br clear="none">&gt;&gt;&gt; well.<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt; Thanks,<br clear="none">&gt;&gt;&gt;&gt; Raghu<br clear="none">&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt; Sent from my iPhone<br clear="none">&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt;&gt; On Jan 29, 2015, at 2:11 AM, Stian Thorgersen &lt;<a href="mailto:stian@redhat.com" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:stian@redhat.com">stian@redhat.com</a>&gt; wrote:<br clear="none">&gt;&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt;&gt; The Keycloak team is proud to announce the release of Keycloak<br clear="none">&gt;&gt;&gt;&gt;&gt; 1.1.0.Final.<br clear="none">&gt;&gt;&gt;&gt;&gt; Highlights in this release includes:<br clear="none">&gt;&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt;&gt; * SAML 2.0<br clear="none">&gt;&gt;&gt;&gt;&gt; * Clustering<br clear="none">&gt;&gt;&gt;&gt;&gt; * Jetty, Tomcat and Fuse adapters<br clear="none">&gt;&gt;&gt;&gt;&gt; * HTTP Security Proxy<br clear="none">&gt;&gt;&gt;&gt;&gt; * Automatic migration of db schema<br clear="none">&gt;&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt;&gt; We’re already started working on features for the next release. Some<br clear="none">&gt;&gt;&gt;&gt;&gt; exiting features coming soon includes:<br clear="none">&gt;&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt;&gt; * Identity brokering<br clear="none">&gt;&gt;&gt;&gt;&gt; * Custom user profiles<br clear="none">&gt;&gt;&gt;&gt;&gt; * Kerberos<br clear="none">&gt;&gt;&gt;&gt;&gt; * OpenID Connect interop<br clear="none">&gt;&gt;&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;&gt;&gt; _______________________________________________<br clear="none">&gt;&gt;&gt;&gt;&gt; keycloak-user mailing list<br clear="none">&gt;&gt;&gt;&gt;&gt; <a href="mailto:keycloak-user@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a><br clear="none">&gt;&gt;&gt;&gt;&gt; <a href="https://lists.jboss.org/mailman/listinfo/keycloak-user" target="_blank" rel="nofollow" shape="rect">https://lists.jboss.org/mailman/listinfo/keycloak-user</a><br clear="none">&gt;&gt;&gt;<br clear="none">&gt;&gt;&gt;<br clear="none">&gt;<br clear="none">&gt; _______________________________________________<br clear="none">&gt; keycloak-user mailing list<br clear="none">&gt; <a href="mailto:keycloak-user@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a><br clear="none">&gt; <a href="https://lists.jboss.org/mailman/listinfo/keycloak-user" target="_blank" rel="nofollow" shape="rect">https://lists.jboss.org/mailman/listinfo/keycloak-user</a><br clear="none">&gt;<br clear="none"><br clear="none">-- <br clear="none">Bill Burke<br clear="none">JBoss, a division of Red Hat<br clear="none"><a href="http://bill.burkecentral.com/" target="_blank" rel="nofollow" shape="rect">http://bill.burkecentral.com</a><div class="yiv0228592185qtdSeparateBR"><br clear="none"><br clear="none"></div><div class="yiv0228592185yqt4918247891" id="yiv0228592185yqtfd78819"><br clear="none">_______________________________________________<br clear="none">keycloak-user mailing list<br clear="none"><a href="mailto:keycloak-user@lists.jboss.org" target="_blank" rel="nofollow" shape="rect" ymailto="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a><br clear="none"><a href="https://lists.jboss.org/mailman/listinfo/keycloak-user" target="_blank" rel="nofollow" shape="rect">https://lists.jboss.org/mailman/listinfo/keycloak-user</a></div><br clear="none"><br clear="none"></div> </div> </div></div>  </div></div></div><br><br></div> </div> </div>  </div></body></html>