[keycloak-dev] implement JPA model
Bill Burke
bburke at redhat.com
Mon Nov 4 10:46:02 EST 2013
On 11/4/2013 10:13 AM, Anil Saldhana wrote:
> On 11/04/2013 03:45 AM, Bolesław Dawidowicz wrote:
>> On 11/01/2013 04:17 PM, Anil Saldhana wrote:
>>> Bill,
>>> this is just a cop out.
>>>
>>> You very well know this is just going to create more headache
>>> if ever KeyCloak is integrated into Wildfly. :)
>>>
>>> In future versions of WF (starting WF9), we want to make use of PL IDM
>>> for the user stores across the subsystems. That is the reason we are
>>> implementing a JDBC store implementation in addition to the JPA store when
>>> a database is involved.
>> How are you going to handle store implementation compatibility? JPA one
>> exposes great deal of flexibility by letting you to map your own
>> entities and shaping the model. I assume JDBC implementation will be
>> much more constrained and enforcing the model? I wonder what are the
>> odds that two applications reuse same identity store implementation if
>> they go beyond very basic schema.
>>
>> Going along this line... benefit for KC would be to integrate with IDM
>> storage that is already in place - JDBC one that you are implementing
>> would be natural fit to integrate with WF. Would be good to know the
>> limitations in advance to adapt.
> JDBC implementation is mainly for deeper WF integration. So if we
> standardize on PicketLink IDM across WF, then KeyCloak can reuse it
> to provide uniform dev experience.
>
The problem with Picketlink IDM is that it is not a security solution.
It is a general purpose persistence solution. You're basically
reinventing JDO/Hibernate, and, honestly, are repeating and fixing the
same mistakes that were made with those solutions years and years and
years ago...
You can't really have a uniform dev experience beyond user/credentials
because well, Keycloak and other technologies have a lot more metadata
that needs to be stored beyond the simplistic OOTB WF security model.
> From a standalone KC perspective, I think it makes sense to
> integrate with PL IDM, to reuse across app servers/runtimes. The IDM
> API is pretty standardized across the teams here
> while the implementation (file, JPA, JDBC,LDAP) can be plugged in.
The current Resteasy OAuth solution can use any security domain defined
in AS7 and EAP6.x. We'll want to do something similar with Keycloak so
that it can be deployed as a solution in existing AS7, EAP6, WF8, and
EAP7 environments. We're not waiting for Picketlink IDM to come on line
and be integrated with WF9 and EAP8.
--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com
More information about the keycloak-dev
mailing list