[keycloak-dev] Claims from UserInfo endpoint are not getting mapped by OIDC identity broker

Stian Thorgersen sthorger at redhat.com
Mon Aug 15 07:07:11 EDT 2016


It should be possible to map claims from the userinfo endpoint, but
attributes are only mapped on first login. We don't currently update
attributes on subsequent logins. Maybe you are trying with an existing user?

On 12 August 2016 at 07:08, Peter Nalyvayko <petervn1 at yahoo.com> wrote:

> Hello,
> It seems that there is no way to map the claims returned by the /userinfo
> endpoint to user attributes.
> I set up an OIDC identity broker to enable external identity broker
> authentication in keycloak. Some of the
> relevant information about the user, such as language, locale, etc. are
> available only by calling the /userinfo point,
> so I wanted to map the claims returned by the endpoint to the user
> attributes using the available mappers.
> Unfortunately, it seems that the Attribute Mapper can maps ID token or
> Access token claims (User Attribute Mapper), and completely ignores the
> userInfo claims.
> Searching through the codebase, I've found that OIDC identity broker calls
> AbstractJsonUserAttributeMapper.storeUserProfileForMapper to store the
> user profile
> returned by the call to /userinfo endpoint in the user's context data.
> However, there seems to be no way
> (without modifying the code that is) to map that data to the attributes of
> the
> federated user created by the OIDC identity broker.
>
> Am I missing something here or this functionality is not available out of
> the box for OIDC identity broker?
>
> I am using keycloak version 2.1.0
>
> Thank you,
> --Peter
>
> _______________________________________________
> keycloak-dev mailing list
> keycloak-dev at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-dev
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/keycloak-dev/attachments/20160815/e4c1feda/attachment-0001.html 


More information about the keycloak-dev mailing list