My comments inline.


On Tue, Feb 25, 2014 at 12:31 PM, Bill Burke <bburke@redhat.com> wrote:
So you want to bind a URL to a specific adapter configuration?
<secured-deployment> might have a <url-pattern> and/or keycloak.json
might be expanded to do the same.

url-pattern could be /foo/bar/*

or even /foo/bar/{realm}/* and keycloak adapter would pull and match a
realm configuration based on this?

yes something like this would do.   
More comments inline

On 2/24/2014 2:28 PM, Travis De Silva wrote:
>
> I had a look at your thoughts on how to do this with Aerogear. If I
> understand the concept correctly, with the UPS + Keycloak in one bundle
> option, we have to update the jboss wildfly config on the fly whenever
> we get new tenants. I did not think of this option and not sure if this
> could be done with wildfly without having to restart wildfly, but even
> if that is possible, that means we are going to have a large list of
> wildfly adapter profiles and I don't think that is practical. Just think
> even if we get 200 tenants, this is going to make it very complicated.
> Also I think the concept is one war per realm so this might not even be
> possible for a single application multi tenant model.
>

There's just no way around a large number of adapter profiles in your
scenario.  Each realm has its own public key in which to verify tokens
with.  Each of these public keys must be known to the adapter.


What about the Per war configuration? I didn't see realm level config in there? So won't that work?

FYI:  Originally we were going to have Keycloak as a SaaS option hosted
as one server on Openshift sso.keycloak.org or something.  Users would
have been able to register and create their own realms.  It was decided
that users might be a little scared of the idea of one database holding
everybody's security metadata, so the idea switched to writing a
cartridge which you could configure solely for your organization.  I
guess what I'm saying is that a cartridge approach might be best in most
scenarios.  Still I want to support your usecase as best we can.


I agree that you guys made the right call. Its the devs who would have built applications on your SaaS platform who would have had issues with that approach. But in our case, end users would not have an issue, especially with the Social Login which ensures that we don't retain their credentials.

Also I appreciate you trying to support this use case. I also don't think you can support all use cases but if there is workarounds or hocks to handle this, then devs like us can work around it. It's ok not to have these features out of the box but at least if there is a way that is great.
  
BTW, I really appreciate the feedback.  Without users trying our stuff
and giving us ideas on how they would like to use Keycloak, we'll never
be successful.  Thanks.

Thanks for the comment. You might not be aware but I have been following you from your angry Bill days and I think you are one smart dude and with guys like you, Keycloak is in good hands :) 

--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com
_______________________________________________
keycloak-user mailing list
keycloak-user@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user