Nice :)
Maybe we could plug in PL permissions to allow more fine-grained control?
----- Original Message -----
From: "Bill Burke" <bburke(a)redhat.com>
To: keycloak-dev(a)lists.jboss.org
Sent: Friday, 21 November, 2014 4:07:03 AM
Subject: [keycloak-dev] security proxy prototype
I was bored of writing adapters, so I decided to take a break and build
a security proxy. Prototype is functional, but still needs some work.
You can secure any HTTP based app or service with zero changes to the
proxied app. You just specify the host port of the server and then
web.xml-like security constraints. I was able to re-use everything we
had so far. Undertow was insanely modular and already had everything I
needed to piece things together.
Left to do? Testing all constraint parameters, build a config parser
and format, and build a distro. Should take 1 or 2 more days for all of
that.
As a side effect, we now have a pure Undertow adapter.
--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com
_______________________________________________
keycloak-dev mailing list
keycloak-dev(a)lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-dev