for the "Custom User Role Attribute Protocol Mapper" feature request.
PR incoming...
Cheers,
Thomas
2016-06-03 11:50 GMT+02:00 Okie Oth <okie.othsam(a)gmail.com>:
I use the setting in a Ubuntu 14.04 environment and there is Apache
2.4
currently the standard. For me the provided binaries on github don't work
and some notes there mention that this releases only work with Apache 2.2.
After a clone and compile it works also with Apache 2.4
./autogen.sh
./configure
make
sudo make install
sudo a2enmod auth_openidc
Cheers,
Eiko
Am 03.06.2016 um 10:36 schrieb Thomas Darimont:
Hello Okie,
great to hear :)
@Stian I already implemented mappers for propagating client and realm role
mappings to JWT tokens.
If you point me to the JIRA issue I can send a PR for it.
Cheers,
Thomas
2016-06-03 10:13 GMT+02:00 Okie Oth <okie.othsam(a)gmail.com>:
> Hello Thomas,
> that's what I'm looking for and it works great also in my test
> environment :)
>
> Thank you.
>
> Cheers
>
>
> Am 02.06.2016 um 23:30 schrieb Thomas Darimont:
>
> Hello group,
>
> Just wanted to let you know that I build a small example [0] that
> demonstrates the usage of Keycloak with mod_auth_oidc [1]
> with Docker + Apache + PHP.
>
> Works like a charm :)
>
> Cheers,
> Thomas
>
> [0]
https://github.com/thomasdarimont/keycloak_mod_auth_oidc_example
> [1]
https://github.com/pingidentity/mod_auth_openidc
>
>
> _______________________________________________
> keycloak-user mailing
listkeycloak-user@lists.jboss.orghttps://lists.jboss.org/mailman/listinfo/keycloak-user
>
>
>