Hi Bill,
thank you for response. I use Adapter deployed in Keycloak 1.7.0. So I need then somehow propagate the list of unprotected (or protected) resources to the KeycloakConfigResolver implementation by my own and return from resolve(...) method when unprotected URIs is accessed.

Best regards,
Bystrik

On Mon, Feb 1, 2016 at 3:26 PM, Bill Burke <bburke@redhat.com> wrote:
Depends on the adapter.  Some/most platforms, the authenticator gets executed irregardless.

On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
Hello,

I have an application that is part of several realms. That's why I implemented the KeycloakConfigResolver and it works fine. 
I observed that the KeycloakConfigResolver implementation gets called even when unprotected resources of the application are requested. Is there a (recommended) way how to avoid it? Or do I do something wrong?

Thank you for the answer.

Best regards,
Bystrik


_______________________________________________
keycloak-user mailing list
keycloak-user@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user

-- 
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com

_______________________________________________
keycloak-user mailing list
keycloak-user@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user