(no subject)
by Kunal Kumar
Hi all,
I am connecting 5 of my web apps to Keycloak for authentication. I already
know that we can change the theme of the Keycloak login page.
But what I am curious about is if the themes for the Keycloak login page
could be slightly different for each of the web app accessed. Is mapping
the theme to the particular redirect_uri of the web app possible?
For example, if a user wants to enter website A he will be redirected to
Keycloak of course, but with a redirect_uri of website A, but using that
redirect_uri value, determining the correct theme to be displayed during
the login.
Is this plausible or just pure fantasy, would like to know your thoughts on
this guys.
Regards,
Kunal Kumar
6 years
keycloak and nginx
by Dimitris Charlaftis
Hello,
I am trying to connect keycloak with an nginx reverse proxy. The nginx
server will receive calls from protected sites , each configured per
virtual host and send the request to keycloak for authorization. When
nginx receives OK from keycloak it proxies back the authenticated call
to client. Correct?
I assume I have to create a realm for that nginx and a client for each
of these sites. Can you provide some configuration for the nginx server?
Regards,
Dimitris.
--
_____________________________
Dimitris Charlaftis
Software Engineer
National Documentation Center
email: dharlaftis(a)ekt.gr
_____________________________
6 years
Clustering + SAML = No backchannel logout. Why?
by Chris Brandhorst
Hi,
We can all see the following warning in the description of the Java Servlet Filter Adapter:
Backchannel logout does not currently work when you have a clustered application that uses the SAML filter.
We are unable to find or guess what the reasons behind these are, so my question is: why? Could someone explain the details as to why this is the case? And on which side (KC or the SAML filter) side things go wrong?
Thanks,
Chris
6 years
Keycloak event-listener-sysout example not working , v4.6.0.Final
by abhilashreddy abhi
Hello,
I am using 4.6.0.Final keycloak version and trying out event-sysout
example (
https://github.com/keycloak/keycloak/tree/master/examples/providers/event...)
,but i am unable to make it work and getting following errors
1) I have created a spring boot application with following classes
--Application.class (Contains Main method)
--SysoutEventListenerProvider
---SysoutEventListenerProviderFactory
I have placed org.keycloak.events.EventListenerProviderFactory file in
src/main/resources/META-INF/services which points to my
SysoutEventListenerProviderFactory.
Did a maven clean install and took the jar from target folder and tried
placing it any one of standalone/deployments folder ,
Keycloak_Home/providers folder and also created as a module as per
instructions in documentation but all of the above methods throws the
following error.
Caused by: java.util.ServiceConfigurationError:
org.keycloak.events.EventListenerProviderFactory: Provider
com.example.demo.springboot.SysoutEventListenerProviderFactory not found
at java.util.ServiceLoader.fail(Unknown Source)
at java.util.ServiceLoader.access$300(Unknown Source)
at java.util.ServiceLoader$LazyIterator.nextService(Unknown Source)
at java.util.ServiceLoader$LazyIterator.next(Unknown Source)
at java.util.ServiceLoader$1.next(Unknown Source)
at
org.keycloak.provider.DefaultProviderLoader.load(DefaultProviderLoader.java:60)
at
org.keycloak.provider.ProviderManager.load(ProviderManager.java:92)
at
org.keycloak.services.DefaultKeycloakSessionFactory.loadFactories(DefaultKeycloakSessionFactory.java:214)
at
org.keycloak.services.DefaultKeycloakSessionFactory.init(DefaultKeycloakSessionFactory.java:80)
at
org.keycloak.services.resources.KeycloakApplication.createSessionFactory(KeycloakApplication.java:331)
at
org.keycloak.services.resources.KeycloakApplication.<init>(KeycloakApplication.java:118)
2) This time, I have removed Application.class and exported the jar using
export->jar in eclipse and tried placing it in deployment folder or
providers or as a module and the application starts but throws the
following log.
ERROR [org.keycloak.events.EventBuilder] (default task-1)
Event listener 'sysout' registered, but provider not found
Can someone please help me with what I am missing?
Thanks
Abhilash
6 years
Custom verification mail with image
by Luka Odak
Hy,
I'm trying to customize email which is sent on executeActionsEmail("VERIFY_EMAIL")
In folder themes I created following structure
mytheme
email
html
messages
text
resources
img
css
theme.properties
and populated it with necessary files. When in messages_en.properties I set <img src=" ${url.resourcesPath}/img/ logo.jpg"> delivered mail is not stylized, but just plain text without image.
I tried to move resources directory through structure but without success. Also I've tried to hardcode path to the image. That way I receive stylized email but without image.
What am I doing wrong?
Thanks.
With best regards
-------------------------------------------------------------
Luka Odak
Software Developer
6 years
Simple server OAuth client?
by Craig Setera
I have a need to do a service-level account connection between two
servers. I believe that the client credentials grant and Keycloak service
accounts are the proper way to handle this. What I'm wondering is if there
is a simple to use OAuth authentication client built into the Keycloak code
that can be used for this purpose? In particular, something that manages
refresh token and such.
It appears like a lot of the logic of interest is available in
RefreshableKeycloakSecurityContext, however I'm not sure if this is really
meant to be consumed as a generic OAuth client library?
Thanks,
Craig
=================================
*Craig Setera*
*Chief Technology Officer*
6 years
Issue to keycloak client access
by Dhara Basida
Hey,
Greetings!
I am currently working on managing client in keycloak. I had set up
proper roles and permission and added policy as required.I had created
the client admin by following the steps given in the keycloak document ,
but I am unable to get access to client page. Any help would be appreciable.
Thanks and Regards,
Dhara Basida
6 years
Issue in keycloak
by Dhara Basida
Hey,
I had installed keycloak version 4.6.0. I am unable to find Client
Permissions Tab as mentioned in your doc for managing single client.It
would be a great appreciation to your help in advance.
Thanks and Regards,
Dhara Basida
6 years
Re: [keycloak-user] [EXTERNAL] Re: Keycloak Admin Realm is not upgraded on Keycloak upgrade from v3.0 to v4.5
by Deepti Tyagi
Re-Sending email, received another email of rejection. Looks like its bounced back.
Thanks,
Deepti
________________________________
From: Deepti Tyagi
Sent: Monday, November 26, 2018 12:19 AM
To: Dmitry Telegin
Cc: Sachin Gandhi; Shankar Bhaskaran
Subject: RE: [EXTERNAL] Re: [keycloak-user] Keycloak Admin Realm is not upgraded on Keycloak upgrade from v3.0 to v4.5
Great Thanks Dmitri for your kind support.
Yes, you are right. On changing back to default keycloak theme, it worked. :)
I had left it to do later, didn't realize that it could be the reason.
Thank You once Again,
Deepti
________________________________
From: Dmitry Telegin [dt(a)acutus.pro]
Sent: Friday, November 23, 2018 9:35 AM
To: Deepti Tyagi
Cc: Sachin Gandhi; Shankar Bhaskaran
Subject: Re: [EXTERNAL] Re: [keycloak-user] Keycloak Admin Realm is not upgraded on Keycloak upgrade from v3.0 to v4.5
External Sender: Use caution with links/attachments.
Deepti,
Didn't you forget to migrate your themes? Your realm references a custom "darktheme", so you should either migrate it too or disable in the database (set REALM.LOGIN_THEME to "keycloak" or NULL). Having done the latter, I was able to login again with Keycloak 4.5.0.
Also it seems that we've found a regression. In the case of nonexistent theme, Keycloak 3.0.0 prints and error falls back to the built-in one, while Keycloak 4.5.0 throws an exception.
Let me know if it works and if I can reply to the ML, so that others could benefit from the answer too.
Good luck,
Dmitry Telegin
CTO, Acutus s.r.o.
Keycloak Consulting and Training
Pod lipami street 339/52, 130 00 Prague 3, Czech Republic
+42 (022) 888-30-71
E-mail: info(a)acutus.pro<mailto:info@acutus.pro>
On Fri, 2018-11-23 at 09:06 +0000, Deepti Tyagi wrote:
Thanks Dmitry for the prompt reply.
It took some time to prepare an standalone reproducible example as you have asked for. Attached the same. Please follow steps mentioned below.
Standalone.xmls, a sample war and non-master realm are attached. I have used postgres DB and its jboss module, though H2 DB should also be fine.
Here you go.
1. Download Keycloak v3.0.0
2. Replace attached standalone.xml
3. Start the server in standalone mode.
4. Access Keycloak on localhost:8880. And upload attached non_master_realm.json
5. Download Wildfly v10.1
6. Install Keycloak adapters. (Keycloak v4.5 adapters also worked fine for me.)
7. Use attached standalone.xml and temp-console.war.
8. Start the server. War should be deployed.
9. Access url (http://localhost:8080/temp-console). It<https://urldefense.proofpoint.com/v2/url?u=http-3A__localhost-3A8080_temp...> should load a login page.
10. Stop Keycloak server.
11. Download Keycloak v4.5
12. Copy standalone, domain folders from old keycloak.
13. Execute below migration scripts.
jboss-cli.sh<https://urldefense.proofpoint.com/v2/url?u=http-3A__jboss-2Dcli.sh&d=DwQF...> --file=migrate-standalone.cli
jboss-cli.sh<https://urldefense.proofpoint.com/v2/url?u=http-3A__jboss-2Dcli.sh&d=DwQF...> --file=migrate-standalone-ha.cli
jboss-cli.sh<https://urldefense.proofpoint.com/v2/url?u=http-3A__jboss-2Dcli.sh&d=DwQF...> --file=migrate-domain-clustered.cli
jboss-cli.sh<https://urldefense.proofpoint.com/v2/url?u=http-3A__jboss-2Dcli.sh&d=DwQF...> --file=migrate-domain-standalone.cli
14. Start keycloak server and access on localhost:8880
15. Restart Wildfly server.
16. Access Wildfly Server Url (http://localhost:8080/temp-console<https://urldefense.proofpoint.com/v2/url?u=http-3A__localhost-3A8080_temp...>). It should reproduce the issue.
17. Check Keycloak v4.5 server.log
Please find below answers to your questions.
On terminology: by "custom admin realm", do you mean simply a non-master realm in Keycloak that you've created yourself?
[D]: Yes
On upgrade process: normally, you don't need to export/import realm data during upgrades, since schema+data migration will be performed by Keycloak itself (it uses Liquibase under the hood).
You only migrate your .xml configs, and then simply run the new Keycloak version with the same database connection. Did you try this?
[D]: Yes. Exactly, same I have been doing.
Thanks,
Deepti
________________________________
From: Dmitry Telegin [dt(a)acutus.pro]
Sent: Wednesday, November 21, 2018 9:34 AM
To: Deepti Tyagi
Subject: [EXTERNAL] Re: [keycloak-user] Keycloak Admin Realm is not upgraded on Keycloak upgrade from v3.0 to v4.5
External Sender: Use caution with links/attachments.
Hi again Deepti,
Just FYI, our company provides a free-of-charge community support on a volunteer basis, but we generally can't afford to spend more than 1-2h per day on that.
For this all to be fruitful, I'd expect your active participation like preparing the reproducible example (see my reply to the ML). Good luck :)
Dmitry Telegin
CTO, Acutus s.r.o.
Keycloak Consulting and Training
Pod lipami street 339/52, 130 00 Prague 3, Czech Republic
+42 (022) 888-30-71
E-mail: info(a)acutus.pro<mailto:info@acutus.pro>
On Wed, 2018-11-21 at 07:28 +0000, Deepti Tyagi wrote:
Hi Team,
I am working on upgrading our in-house Keycloak Server from v3.0 to v4.5. Facing issue on trying to re-use old custom admin realm. Is there any way we can re-use the old admin realm or preserve at least users?
We have another Wildfly 10 application that use Keycloak v3.0 for authentication purpose using a custom admin realm (custom-realm.json) that have multiple clients, roles, users and protocol mappers.
While upgrading keycloak, I had run migration scripts to upgrade standalone, domain.xmls. Postgres DB also gets upgraded and able to login to Keycloak using the same admin user in v3.0.
Though, our Wildfly 10 application isn't able to authenticate with keycloak using that old custom-realm (with new jboss adapters even).
I had to re-create a new custom admin realm, created same clients, roles, users to make it work. And had to trash old realm that deleted all users also.
I also tried multiple workarounds like;
1. Created a new custom-realm on v4.5 and compared with v3.0 on keycloak UI, no visible difference.
2. Partially re-imported new custom realm having same clients and roles. No help.
3. Trashed old realm and imported new custom realm, then tried partially importing old custom realm users. Its not allowed. (KC-SERVICES0037: Error creating user: java.lang.RuntimeException: Unable to find client role mappings for client: ds-data)
With the 3rd attempt, I can see at least keycloak login page on our wildfly 10 application but can not login till I create admin user manually.
With 1st and 2nd attempt, I do not even see keycloak login page on our wildfly 10 application and below exception is thrown in keycloak server.log.
2018-11-20 23:56:30,691 WARN [org.keycloak.events<https://urldefense.proofpoint.com/v2/url?u=http-3A__org.keycloak.events&d...>] (default task-2) type=LOGIN_ERROR, realmId=DecisionSpace_Integration_Server, clientId=dsis-console, userId=null, ipAddress=127.0.0.1<https://urldefense.proofpoint.com/v2/url?u=http-3A__127.0.0.1&d=DwQFaQ&c=...>, error=invalid_user_credentials, auth_method=openid-connect, auth_type=code, response_type=code, redirect_uri=http://localhost:8080/dsdataserver-console/<https://urldefense.proofpoint.com/v2/url?u=http-3A__localhost-3A8080_dsda...>, code_id=a50ff093-64b8-43d2-a353-2a3ec1346297, response_mode=query
2018-11-20 23:56:30,692 ERROR [org.keycloak.services.error.KeycloakErrorHandler] (default task-2) Uncaught server error: java.lang.NullPointerException
at org.keycloak.theme.ExtendingThemeManager.loadTheme(ExtendingThemeManager.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ExtendingThemeManager...>:117)
at org.keycloak.theme.ExtendingThemeManager.getTheme(ExtendingThemeManager.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ExtendingThemeManager...>:95)
at org.keycloak.theme.DefaultThemeManager.getTheme(DefaultThemeManager.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__DefaultThemeManager.j...>:26)
at org.keycloak.theme.DefaultThemeManager.getTheme(DefaultThemeManager.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__DefaultThemeManager.j...>:21)
at org.keycloak.forms.login.freemarker.FreeMarkerLoginFormsProvider.getTheme(FreeMarkerLoginFormsProvider.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__FreeMarkerLoginFormsP...>:267)
at org.keycloak.forms.login.freemarker.FreeMarkerLoginFormsProvider.createResponse(FreeMarkerLoginFormsProvider.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__FreeMarkerLoginFormsP...>:160)
at org.keycloak.forms.login.freemarker.FreeMarkerLoginFormsProvider.createErrorPage(FreeMarkerLoginFormsProvider.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__FreeMarkerLoginFormsP...>:506)
at org.keycloak.services.ErrorPage.error(ErrorPage.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ErrorPage.java&d=DwQF...>:31)
at org.keycloak.authentication.AuthenticationProcessor.handleBrowserException(AuthenticationProcessor.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__AuthenticationProcess...>:728)
at org.keycloak.protocol.AuthorizationEndpointBase.handleBrowserAuthenticationRequest(AuthorizationEndpointBase.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__AuthorizationEndpoint...>:143)
at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.buildAuthorizationCodeAuthorizationResponse(AuthorizationEndpoint.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__AuthorizationEndpoint...>:409)
at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.process(AuthorizationEndpoint.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__AuthorizationEndpoint...>:152)
at org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.buildGet(AuthorizationEndpoint.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__AuthorizationEndpoint...>:108)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__NativeMethodAccessorI...>:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__DelegatingMethodAcces...>:43)
at java.lang.reflect.Method.invoke(Method.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__Method.java&d=DwQFaQ&...>:498)
at org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__MethodInjectorImpl.ja...>:140)
at org.jboss.resteasy.core.ResourceMethodInvoker.internalInvokeOnTarget(ResourceMethodInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceMethodInvoker...>:510)
at org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTargetAfterFilter(ResourceMethodInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceMethodInvoker...>:401)
at org.jboss.resteasy.core.ResourceMethodInvoker.lambda$invokeOnTarget$0(ResourceMethodInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceMethodInvoker...>:365)
at org.jboss.resteasy.core.interception.PreMatchContainerRequestContext.filter(PreMatchContainerRequestContext.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__PreMatchContainerRequ...>:361)
at org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceMethodInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceMethodInvoker...>:367)
at org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceMethodInvoker...>:339)
at org.jboss.resteasy.core.ResourceLocatorInvoker.invokeOnTargetObject(ResourceLocatorInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceLocatorInvoke...>:137)
at org.jboss.resteasy.core.ResourceLocatorInvoker.invoke(ResourceLocatorInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceLocatorInvoke...>:106)
at org.jboss.resteasy.core.ResourceLocatorInvoker.invokeOnTargetObject(ResourceLocatorInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceLocatorInvoke...>:132)
at org.jboss.resteasy.core.ResourceLocatorInvoker.invoke(ResourceLocatorInvoker.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ResourceLocatorInvoke...>:100)
at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__SynchronousDispatcher...>:441)
at org.jboss.resteasy.core.SynchronousDispatcher.lambda$invoke$4(SynchronousDispatcher.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__SynchronousDispatcher...>:231)
at org.jboss.resteasy.core.SynchronousDispatcher.lambda$preprocess$0(SynchronousDispatcher.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__SynchronousDispatcher...>:137)
at org.jboss.resteasy.core.interception.PreMatchContainerRequestContext.filter(PreMatchContainerRequestContext.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__PreMatchContainerRequ...>:361)
at org.jboss.resteasy.core.SynchronousDispatcher.preprocess(SynchronousDispatcher.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__SynchronousDispatcher...>:140)
at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__SynchronousDispatcher...>:217)
at org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletContainerDispa...>:227)
at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__HttpServletDispatcher...>:56)
at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__HttpServletDispatcher...>:51)
at javax.servlet.http.HttpServlet.service(HttpServlet.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__HttpServlet.java&d=Dw...>:790)
at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletHandler.java&d...>:74)
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__FilterHandler.java&d=...>:129)
at org.keycloak.services.filters.KeycloakSessionServletFilter.doFilter(KeycloakSessionServletFilter.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__KeycloakSessionServle...>:90)
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ManagedFilter.java&d=...>:61)
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__FilterHandler.java&d=...>:131)
at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__FilterHandler.java&d=...>:84)
at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletSecurityRoleHa...>:62)
at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletChain.java&d=D...>:68)
at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletDispatchingHan...>:36)
at org.wildfly.extension.undertow.security.SecurityContextAssociationHandler.handleRequest(SecurityContextAssociationHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__SecurityContextAssoci...>:78)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__PredicateHandler.java...>:43)
at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__SSLInformationAssocia...>:132)
at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletAuthentication...>:57)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__PredicateHandler.java...>:43)
at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__AbstractConfidentiali...>:46)
at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletConfidentialit...>:64)
at io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRequest(AuthenticationMechanismsHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__AuthenticationMechani...>:60)
at io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandler.handleRequest(CachedAuthenticatedSessionHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__CachedAuthenticatedSe...>:77)
at io.undertow.security.handlers.NotificationReceiverHandler.handleRequest(NotificationReceiverHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__NotificationReceiverH...>:50)
at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__AbstractSecurityConte...>:43)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__PredicateHandler.java...>:43)
at org.wildfly.extension.undertow.security.jacc.JACCContextIdHandler.handleRequest(JACCContextIdHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__JACCContextIdHandler....>:61)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__PredicateHandler.java...>:43)
at org.wildfly.extension.undertow.deployment.GlobalRequestControllerHandler.handleRequest(GlobalRequestControllerHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__GlobalRequestControll...>:68)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__PredicateHandler.java...>:43)
at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletInitialHandler...>:292)
at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletInitialHandler...>:81)
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletInitialHandler...>:138)
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletInitialHandler...>:135)
at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletRequestContext...>:48)
at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ContextClassLoaderSet...>:43)
at org.wildfly.extension.undertow.security.SecurityContextThreadSetupAction.lambda$create$0(SecurityContextThreadSetupAction.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__SecurityContextThread...>:105)
at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__UndertowDeploymentInf...>:1514)
at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__UndertowDeploymentInf...>:1514)
at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__UndertowDeploymentInf...>:1514)
at org.wildfly.extension.undertow.deployment.UndertowDeploymentInfoService$UndertowThreadSetupAction.lambda$create$0(UndertowDeploymentInfoService.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__UndertowDeploymentInf...>:1514)
at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletInitialHandler...>:272)
at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletInitialHandler...>:81)
at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ServletInitialHandler...>:104)
at io.undertow.server.Connectors.executeRootHandler(Connectors.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__Connectors.java&d=DwQ...>:360)
at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__HttpServerExchange.ja...>:830)
at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__ContextClassLoaderSav...>:35)
at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__EnhancedQueueExecutor...>:1985)
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__EnhancedQueueExecutor...>:1487)
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__EnhancedQueueExecutor...>:1378)
at java.lang.Thread.run(Thread.java<https://urldefense.proofpoint.com/v2/url?u=http-3A__Thread.java&d=DwQFaQ&...>:748)
Thanks,
Deepti
----------------------------------------------------------------------
This e-mail, including any attached files, may contain confidential and privileged information for the sole use of the intended recipient. Any review, use, distribution, or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive information for the intended recipient), please contact the sender by reply e-mail and delete all copies of this message.
_______________________________________________
keycloak-user mailing list
keycloak-user(a)lists.jboss.org<mailto:keycloak-user@lists.jboss.org>
https://lists.jboss.org/mailman/listinfo/keycloak-user<https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.jboss.org_mail...>
6 years