You should use the master realm as it permits access to all realms as well
as creating realms.
Create a client ;)
On 28 October 2015 at 06:17, Giulio Vito de Musso <
giulio.vito.demusso(a)gmail.com> wrote:
Hi Stian, all,
Reading your first link I can see that the URL to call to get a token is
http:<KeycloakHost>/auth/realms/{realm-name}/protocol/openid-connect/token
"
But what is the realm-name to use? I'm trying to execute an operation
which is above all realms (which is create a new realm posting the JSON)
Moreover I should provide a client_id in the request body, but I don't
know which client ID to use.
Thanks
Giulio
2015-10-28 3:49 GMT+01:00 Stian Thorgersen <sthorger(a)redhat.com>:
> You'll need a bearer token to invoke the services. A token can be
> obtained either using the direct grant (or resource owner password grant as
> oauth calls it) or using the standard web flow.
>
> Take a look at:
>
>
https://github.com/keycloak/keycloak/blob/master/examples/demo-template/a...
>
> Or if you are invoking from Java, simply use our Java admin client lib:
>
>
https://github.com/keycloak/keycloak/blob/master/examples/admin-client/sr...
>
> On 27 October 2015 at 07:09, Giulio Vito de Musso <
> giulio.vito.demusso(a)gmail.com> wrote:
>
>>
>> Hello you all,
>>
>> I need to configure realms in Keycloak through the Admin WS accessible
>> at the path
>>
>>
http://KeycloakServer:8081/auth/admin/realms
>>
>> So in Postman I run the following request
>>
>> URL:
http://KeycloakServer:8081/auth/admin/realms
>>
>> Method: POST
>>
>> Body:
>>
>> {
>> "enabled": true,
>> "id": "TestRealm",
>> }
>>
>> I get a 401 Unauthorized response, so I think it is necessary to
>> authenticate to the Admin WS. But in the docs I cannot find any information
>> about the type of authentication required and the syntax. Do you know how
>> to authenticate to the Keycloak WSs?
>>
>> Thank you
>>
>> _______________________________________________
>> keycloak-dev mailing list
>> keycloak-dev(a)lists.jboss.org
>>
https://lists.jboss.org/mailman/listinfo/keycloak-dev
>>
>
>