Hi Bill,
thank you for response. I use Adapter deployed in Keycloak 1.7.0. So I need
then somehow propagate the list of unprotected (or protected) resources to
the KeycloakConfigResolver implementation by my own and return from
resolve(...) method when unprotected URIs is accessed.
Best regards,
Bystrik
On Mon, Feb 1, 2016 at 3:26 PM, Bill Burke <bburke(a)redhat.com> wrote:
Depends on the adapter. Some/most platforms, the authenticator gets
executed irregardless.
On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
Hello,
I have an application that is part of several realms. That's why I
implemented the KeycloakConfigResolver and it works fine.
I observed that the KeycloakConfigResolver implementation gets called even
when unprotected resources of the application are requested. Is there a
(recommended) way how to avoid it? Or do I do something wrong?
Thank you for the answer.
Best regards,
Bystrik
_______________________________________________
keycloak-user mailing
listkeycloak-user@lists.jboss.orghttps://lists.jboss.org/mailman/listinfo/keycloak-user
--
Bill Burke
JBoss, a division of Red
Hathttp://bill.burkecentral.com
_______________________________________________
keycloak-user mailing list
keycloak-user(a)lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user