Depends on the adapter. Some/most platforms, the authenticator gets executed irregardless.
On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
Hello,
I have an application that is part of several realms. That's why I implemented the KeycloakConfigResolver and it works fine.I observed that the KeycloakConfigResolver implementation gets called even when unprotected resources of the application are requested. Is there a (recommended) way how to avoid it? Or do I do something wrong?
Thank you for the answer.
Best regards,Bystrik
_______________________________________________ keycloak-user mailing list keycloak-user@lists.jboss.org https://lists.jboss.org/mailman/listinfo/keycloak-user
-- Bill Burke JBoss, a division of Red Hat http://bill.burkecentral.com
_______________________________________________
keycloak-user mailing list
keycloak-user@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user