Thomas fancy adding a page about using mod_auth_openidc to our new docs?Git repo is here: https://github.com/keycloak/securing_apps_guidePublished guide is here: https://keycloak.gitbooks.io/securing-client-applications-guide/content/topics/oidc/oidc-overview.htmlOn 3 June 2016 at 13:15, Thomas Darimont <thomas.darimont@googlemail.com> wrote:FYI I created https://issues.jboss.org/browse/KEYCLOAK-3081for the "Custom User Role Attribute Protocol Mapper" feature request.PR incoming...Cheers,Thomas2016-06-03 11:50 GMT+02:00 Okie Oth <okie.othsam@gmail.com>:I use the setting in a Ubuntu 14.04 environment and there is Apache 2.4 currently the standard. For me the provided binaries on github don't work and some notes there mention that this releases only work with Apache 2.2.
After a clone and compile it works also with Apache 2.4
./autogen.sh
./configure
make
sudo make install
sudo a2enmod auth_openidc
Cheers,
Eiko
Am 03.06.2016 um 10:36 schrieb Thomas Darimont:
Hello Okie,
great to hear :)
@Stian I already implemented mappers for propagating client and realm role mappings to JWT tokens.If you point me to the JIRA issue I can send a PR for it.
Cheers,Thomas
2016-06-03 10:13 GMT+02:00 Okie Oth <okie.othsam@gmail.com>:
Hello Thomas,
that's what I'm looking for and it works great also in my test environment :)
Thank you.
Cheers
Am 02.06.2016 um 23:30 schrieb Thomas Darimont:
Hello group,
Just wanted to let you know that I build a small example [0] thatdemonstrates the usage of Keycloak with mod_auth_oidc [1]with Docker + Apache + PHP.
Works like a charm :)
Cheers,Thomas
_______________________________________________ keycloak-user mailing list keycloak-user@lists.jboss.org https://lists.jboss.org/mailman/listinfo/keycloak-user
_______________________________________________
keycloak-user mailing list
keycloak-user@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user