If you don't want Keycloak dependencies, you can use
request.getRemoteUser() or request.getPrincipal().getName() to access
just the userId of authenticated user. If you use "principal-attribute"
in keycloak.json, it will return the configured attribute instead of
userId, so you can receive for example username or email instead. But
that way, you will be able to access just this single attribute.
Marek
On 26/10/15 09:52, Tim Dudgeon wrote:
Wondered if anyone had any thoughts on this?
On 21/10/2015 12:04, Tim Dudgeon wrote:
> In the case of a web application (e.g. Tomcat app secured by the
> keycloak adapter) the web app might need to access details of the
> authenticated user (e.g. full name or email).
> I've found that this information is available from the session like
> this:
>
> KeycloakSecurityContext session =
>
(KeycloakSecurityContext)request.getAttribute(KeycloakSecurityContext.class.getName());
> IDToken idToken = session.getIdToken();
> String email = idToken.getEmail();
>
> One issue with this is that all your web apps are tied to keycloak.
>
> Is this the right way to handle this?
> Are there alternatives?
>
> Tim
>
_______________________________________________
keycloak-user mailing list
keycloak-user(a)lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user