Depends on the adapter.  Some/most platforms, the authenticator gets executed irregardless.

On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
Hello,

I have an application that is part of several realms. That's why I implemented the KeycloakConfigResolver and it works fine. 
I observed that the KeycloakConfigResolver implementation gets called even when unprotected resources of the application are requested. Is there a (recommended) way how to avoid it? Or do I do something wrong?

Thank you for the answer.

Best regards,
Bystrik


_______________________________________________
keycloak-user mailing list
keycloak-user@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user

-- 
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com