Hi Christophe,
Basically, there are two options here:
- implement a native login form inside your mobile app and use direct
grant flow. Simply said, this will allow you to POST username +
password to an URL inside Keycloak and obtain access token that you'll
later use to access REST services secured by Keycloak;
- embed a browser widget, let the user authenticate interactively via
Keycloak login screen, obtain a token upon successful login, use token
to access REST services.
Important: in the first scenario, you'll need to know beforehand what
kind of credentials are required by Keycloak (is it username+password,
or username+password+otp etc.) With the second approach, you won't need
to bother as everything will be handled by Keycloak's login UI.
Cheers,
Dmitry Telegin
CTO, Acutus s.r.o.
Keycloak Consulting and Training
Pod lipami street 339/52, 130 00 Prague 3, Czech Republic
+ 42 (022) 888-30-71
E-mail: info(a)acutus.pro
On Fri, 2018-07-06 at 11:21 +0200, Christophe Lehingue wrote:
Hello,
I use keycloak for authentication via a website: it's ok.
On the other hand, how to configure keycloak so that it is
exploitable
for native mobile applications?
Thank you for your attention,
Regards,
Christophe
*==== IN frenchBonjour,J'utilise keycloak pour l'authentification via
un site web : c'est ok.Par contre, comment configurer keycloak afin
que ce soit exploitable pour des applications mobiles natives ?Merci
de votre attention,Cordialement,Christophe*
_______________________________________________
keycloak-user mailing list
keycloak-user(a)lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user