Hi Marek
I was originally thinking the same - but it would complicate the demo more.
Its possible that the database-service could simply be changed to support both bearer and
basic auth, and then provide curl instructions to demonstrate basic auth access, but then
there wouldn't be an example showing a bearer-only configuration.
So assuming that a 'bearer-only' example is still required, then having a
completely independent basic auth example may be the next best thing - and then leave it
as an exercise for the user to enable basic auth on the database-service?
Regards
Gary
----- Original Message -----
> Sent previous email before I figured that you guys already decide on
> something, so feel free to ignore me:-)
>
> On the other hand, it may be nice to show in the example that particular
> jaxrs endpoint is able to support both bearer and basic auth in same
> application imo.
>
> Marek
>
> On 27.11.2014 15:26, Gary Brown wrote:
>> Ok sounds good.
>>
>> ----- Original Message -----
>>> Another option is to add a separate basic example outside of the demo,
>>> like
>>> what was done for multi-tenancy. A single jax-rs endpoint that supports
>>> basic auth and an example curl command to invoke it?
>>>
>>> ----- Original Message -----
>>>> From: "Gary Brown" <gbrown(a)redhat.com>
>>>> To: "Stian Thorgersen" <stian(a)redhat.com>
>>>> Cc: "Marek Posolda" <mposolda(a)redhat.com>,
keycloak-user(a)lists.jboss.org
>>>> Sent: Thursday, 27 November, 2014 2:59:46 PM
>>>> Subject: Re: [keycloak-user] REST services supporting basic auth and
>>>> bearer
>>>> tokens
>>>>
>>>> In terms of example, was thinking the database-service is ideal -
however
>>>> I'm
>>>> guessing it also needs to be shown as a 'bearer-only' example (as
now).
>>>>
>>>> In the same way that there is multiple customer-apps, one approach could
>>>> be
>>>> to have an alternate database-service supporting basic auth as well, but
>>>> then would also need a separate copy of the testrealm.json.
>>>>
>>>> Thoughts?
>>>>
>>>> ----- Original Message -----
>>>>> Great, if you do a PR include an example we can merge it before a
>>>>> 1.1.0.Beta2
>>>>> release (probably next week)
>>>>>
>>>>> ----- Original Message -----
>>>>>> From: "Gary Brown" <gbrown(a)redhat.com>
>>>>>> To: "Stian Thorgersen" <stian(a)redhat.com>
>>>>>> Cc: "Marek Posolda" <mposolda(a)redhat.com>,
>>>>>> keycloak-user(a)lists.jboss.org
>>>>>> Sent: Thursday, 27 November, 2014 1:48:55 PM
>>>>>> Subject: Re: [keycloak-user] REST services supporting basic auth
and
>>>>>> bearer
>>>>>> tokens
>>>>>>
>>>>>>
>>>>>>
>>>>>> ----- Original Message -----
>>>>>>> Looks good to me, but I'd like it to be an optional
feature that is
>>>>>>> enabled
>>>>>>> in keycloak.json (should be disabled by default).
>>>>>> Sounds reasonable - I'll call the property
'enableBasicAuth'.
>>>>>>
>>>>>>> Another thing is that we should add an example +
documentation for
>>>>>>> this
>>>>>>> feature.
>>>>>> Will do.
>>>>>>
>>>>>>> ----- Original Message -----
>>>>>>>> From: "Gary Brown" <gbrown(a)redhat.com>
>>>>>>>> To: "Marek Posolda"
<mposolda(a)redhat.com>
>>>>>>>> Cc: keycloak-user(a)lists.jboss.org
>>>>>>>> Sent: Thursday, 27 November, 2014 10:58:21 AM
>>>>>>>> Subject: Re: [keycloak-user] REST services supporting
basic auth
>>>>>>>> and
>>>>>>>> bearer
>>>>>>>> tokens
>>>>>>>>
>>>>>>>> Hi Marek
>>>>>>>>
>>>>>>>> ----- Original Message -----
>>>>>>>>> Hi,
>>>>>>>>>
>>>>>>>>> I am not 100% sure if having basic auth with direct
grant
>>>>>>>>> directly
>>>>>>>>> in
>>>>>>>>> our adapters is way to go. Probably yes as for your
use-case it
>>>>>>>>> makes
>>>>>>>>> sense, so I am slightly for push your change as PR.
But maybe
>>>>>>>>> others
>>>>>>>>> from team have different opinion.
>>>>>>>>>
>>>>>>>>> Earlier this week I've added
DirectAccessGrantsLoginModule to KC
>>>>>>>>> codebase, which is quite similar and is intended to
be used for
>>>>>>>>> non-web
>>>>>>>>> applications (like SSH), which rely on JAAS. But I
guess that
>>>>>>>>> using
>>>>>>>>> this
>>>>>>>>> one is not good option for you as you want support
for Basic and
>>>>>>>>> Bearer
>>>>>>>>> authentication in same web application, right?
>>>>>>>> Thats correct.
>>>>>>>>
>>>>>>>>> Few more minor points to your changes:
>>>>>>>>> - Is it possible to use net.iharder.Base64 instead
of
>>>>>>>>> org.apache.commons.codec.binary.Base64? Whole KC code
has
>>>>>>>>> dependency
>>>>>>>>> on
>>>>>>>>> net.iharder, so would be likely better to use this
one to avoid
>>>>>>>>> possible
>>>>>>>>> dependency issues in adapters.
>>>>>>>> That shouldn't be a problem.
>>>>>>>>
>>>>>>>>> - Wonder if it's possible to simplify a bit, like
have single
>>>>>>>>> "completeAuthentication" method for both
bearer and basic
>>>>>>>>> authenticator
>>>>>>>>> (afaik only difference among them is different
authMethod
>>>>>>>>> right?).
>>>>>>>>> But
>>>>>>>>> this is really minor.
>>>>>>>> Will do.
>>>>>>>>
>>>>>>>> I'll wait until mid next week before doing any more
on this, to see
>>>>>>>> whether
>>>>>>>> others have an opinion.
>>>>>>>>
>>>>>>>> If the PR was accepted, any chance it could go into 1.1
even though
>>>>>>>> in
>>>>>>>> beta?
>>>>>>>> If no, any idea what the timescale is for 1.2.beta1?
>>>>>>>>
>>>>>>>> Thanks for your feedback.
>>>>>>>>
>>>>>>>> Regards
>>>>>>>> Gary
>>>>>>>>
>>>>>>>>> Marek
>>>>>>>>>
>>>>>>>>> On 26.11.2014 14:54, Gary Brown wrote:
>>>>>>>>>> Hi
>>>>>>>>>>
>>>>>>>>>> Concrete use case - we have implemented the OASIS
S-RAMP
>>>>>>>>>> specification,
>>>>>>>>>> in
>>>>>>>>>> which it requires basic auth support
>>>>>>>>>>
(
http://docs.oasis-open.org/s-ramp/s-ramp/v1.0/s-ramp-v1.0-part2-atom-bind...
>>>>>>>>>> section 5 "The S-RAMP Specification does not
attempt to define
>>>>>>>>>> a
>>>>>>>>>> security
>>>>>>>>>> model for products that implement it. For the
Atom Binding,
>>>>>>>>>> the
>>>>>>>>>> only
>>>>>>>>>> security requirement is that at a minimum, client
and server
>>>>>>>>>> implementations MUST be capable of being
configured to use HTTP
>>>>>>>>>> Basic
>>>>>>>>>> Authentication in conjunction with a connection
made with
>>>>>>>>>> TLS.").
>>>>>>>>>>
>>>>>>>>>> However we also need the same service to support
bearer token,
>>>>>>>>>> for
>>>>>>>>>> use
>>>>>>>>>> within our KeyCloak SSO session.
>>>>>>>>>>
>>>>>>>>>> I've implemented a possible solution, details
defined on
>>>>>>>>>>
https://issues.jboss.org/browse/KEYCLOAK-861.
>>>>>>>>>>
>>>>>>>>>> If this solution is on the right path, I would
appreciate any
>>>>>>>>>> feedback
>>>>>>>>>> on
>>>>>>>>>> any changes that might be required before
submitting a PR.
>>>>>>>>>> Currently
>>>>>>>>>> there
>>>>>>>>>> are no tests, but would aim to provide some with
the PR.
>>>>>>>>>>
>>>>>>>>>> Regards
>>>>>>>>>> Gary
>>>>>>>>>> _______________________________________________
>>>>>>>>>> keycloak-user mailing list
>>>>>>>>>> keycloak-user(a)lists.jboss.org
>>>>>>>>>>
https://lists.jboss.org/mailman/listinfo/keycloak-user
>>>>>>>> _______________________________________________
>>>>>>>> keycloak-user mailing list
>>>>>>>> keycloak-user(a)lists.jboss.org
>>>>>>>>
https://lists.jboss.org/mailman/listinfo/keycloak-user
>>>>>>>>
>