Depends on the adapter. Some/most platforms, the authenticator gets
executed irregardless.
On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
Hello,
I have an application that is part of several realms. That's why I
implemented the KeycloakConfigResolver and it works fine.
I observed that the KeycloakConfigResolver implementation gets called
even when unprotected resources of the application are requested. Is
there a (recommended) way how to avoid it? Or do I do something wrong?
Thank you for the answer.
Best regards,
Bystrik
_______________________________________________
keycloak-user mailing list
keycloak-user(a)lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user
--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com