just code. It's functional, but still a work in progress. All i did
was set up a handler chain that re-used our existing Undertow auth
mechanism, with the last handler being a SimpleProxyClientProvider. I
also forked your servlet constraint matching logic so that I could
define role mappings in the proxy layer.
https://github.com/keycloak/keycloak/tree/master/proxy/proxy-server
https://github.com/keycloak/keycloak/tree/master/testsuite/proxy
BTW, do you know any standard headers I could use to forward security
information?
On 11/21/2014 7:00 AM, Stuart Douglas wrote:
Also do you have any details posted somewhere about how you did it?
Stuart
----- Original Message -----
> From: "Stuart Douglas" <sdouglas(a)redhat.com>
> To: "Bill Burke" <bburke(a)redhat.com>
> Cc: undertow-dev(a)lists.jboss.org
> Sent: Friday, 21 November, 2014 7:06:43 PM
> Subject: Re: [undertow-dev] awesome
>
>
>
> ----- Original Message -----
>> From: "Bill Burke" <bburke(a)redhat.com>
>> To: undertow-dev(a)lists.jboss.org
>> Sent: Friday, 21 November, 2014 2:13:03 PM
>> Subject: [undertow-dev] awesome
>>
>> I couldn't believe how easy it was to create an http security proxy for
>> Keycloak using undertow. Undertow was insanely modular and easy to
>> piece together how I wanted. Great work guys.
>
> Awesome :-)
>
> Stuart
>
>>
>> Thanks
>>
>> --
>> Bill Burke
>> JBoss, a division of Red Hat
>>
http://bill.burkecentral.com
>> _______________________________________________
>> undertow-dev mailing list
>> undertow-dev(a)lists.jboss.org
>>
https://lists.jboss.org/mailman/listinfo/undertow-dev
>>
>
--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com