<html>
<head>
<meta content="text/html; charset=windows-1252"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
This was really only implemented to run in the admin console for
browser applications. The behavior depends on what realm the user
and admin/impersonator is in. If the user is NOT in the master
realm and the impersonator IS in the master realm, then a brand new
session is created and the admin remains logged in. That allows
them to switch between being an admin and the user in the same
browser session. If the user and impersonator are in the same
realm, then the admin is logged out and logged in as the user.<br>
<br>
<br>
<br>
<div class="moz-cite-prefix">On 5/5/2016 4:14 AM, Daniele Bonetto
wrote:<br>
</div>
<blockquote
cite="mid:6eef03f0-5e30-4fb3-6523-6f967192fd6b@dnshosting.it"
type="cite">
<pre wrap="">Hi guys,
i have a little confusion about how impersonate works in Keycloak.
I saw there's a impersonate API that can be called with impersonate
privileges.
I expected when called the API in some ways changes current logged user
session data with impersonated user informations, but seems nothing will
change in keycloak sessions neither returns the changed tokens and the
current user sessions seems still alive.
I also checked keycloak.js to find some method that allows me to call
impersonate API from my webapp to allow our operators to access as users.
Can someone help me please?
Best regards,
Daniele Bonetto
_______________________________________________
keycloak-user mailing list
<a class="moz-txt-link-abbreviated" href="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a>
<a class="moz-txt-link-freetext" href="https://lists.jboss.org/mailman/listinfo/keycloak-user">https://lists.jboss.org/mailman/listinfo/keycloak-user</a>
</pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">--
Bill Burke
JBoss, a division of Red Hat
<a class="moz-txt-link-freetext" href="http://bill.burkecentral.com">http://bill.burkecentral.com</a></pre>
</body>
</html>