<div dir="ltr">I highly recommend using an embedded webview and not use native login and direct grant api. That is best practice both for Keycloak and OIDC in general.</div><div class="gmail_extra"><br><div class="gmail_quote">On 26 September 2016 at 05:21, Joey <span dir="ltr"><<a href="mailto:huazonglin@gmail.com" target="_blank">huazonglin@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Thanks Guys, sorry for reply so late. I will try your solutions later. thanks.<br>
<div class="HOEnZb"><div class="h5"><br>
On Thu, Sep 22, 2016 at 8:39 PM, Thomas Darimont<br>
<<a href="mailto:thomas.darimont@googlemail.com">thomas.darimont@googlemail.<wbr>com</a>> wrote:<br>
> Hello,<br>
><br>
> I adapted an Android based OpenID Connect Demo Application to work with<br>
> Keycloak.<br>
> In Keycloak I created a confidential client with direct access grants as<br>
> Scott described.<br>
><br>
> <a href="https://github.com/thomasdarimont/android-openid-connect/tree/feature/keycloak-oidc-demo" rel="noreferrer" target="_blank">https://github.com/<wbr>thomasdarimont/android-openid-<wbr>connect/tree/feature/keycloak-<wbr>oidc-demo</a><br>
> See the recent commits in the feature/keycloak-oidc-demo branch.<br>
><br>
> Cheers,<br>
> Thomas<br>
><br>
> 2016-09-22 13:57 GMT+02:00 Scott Rossillo <<a href="mailto:srossillo@smartling.com">srossillo@smartling.com</a>>:<br>
>><br>
>> You can do that using direct access grants if you search the docs for it.<br>
>> However, we have native apps and just skinned our login pages to be<br>
>> responsive and look great on mobile.<br>
>><br>
>> The latter option is a better approach especially if you plan to implement<br>
>> 2FA.<br>
>><br>
>> On Thu, Sep 22, 2016 at 6:27 AM Joey <<a href="mailto:huazonglin@gmail.com">huazonglin@gmail.com</a>> wrote:<br>
>>><br>
>>> Hi Guys,<br>
>>><br>
>>> We are building a system, including 3 subsystems for a big website.<br>
>>> and iOS and Android app. We use KeyCloak as the SSO server for all<br>
>>> subsystems, and then we also want to use KeyCloak for iOS and Android<br>
>>> as the login server. But for iOS, Android we want to use native login<br>
>>> page not the html page provide by KeyCloak adapter. but I read all<br>
>>> documents and discussions, I didnt find a way how to implement it.<br>
>>> Anybody can help me? thanks.<br>
>>><br>
>>><br>
>>> Joey<br>
>>> ______________________________<wbr>_________________<br>
>>> keycloak-user mailing list<br>
>>> <a href="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a><br>
>>> <a href="https://lists.jboss.org/mailman/listinfo/keycloak-user" rel="noreferrer" target="_blank">https://lists.jboss.org/<wbr>mailman/listinfo/keycloak-user</a><br>
>><br>
>><br>
>> ______________________________<wbr>_________________<br>
>> keycloak-user mailing list<br>
>> <a href="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a><br>
>> <a href="https://lists.jboss.org/mailman/listinfo/keycloak-user" rel="noreferrer" target="_blank">https://lists.jboss.org/<wbr>mailman/listinfo/keycloak-user</a><br>
><br>
><br>
______________________________<wbr>_________________<br>
keycloak-user mailing list<br>
<a href="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a><br>
<a href="https://lists.jboss.org/mailman/listinfo/keycloak-user" rel="noreferrer" target="_blank">https://lists.jboss.org/<wbr>mailman/listinfo/keycloak-user</a><br>
</div></div></blockquote></div><br></div>