[keycloak-user] Keycloak Adapter without web.xml security-constraint

Scott Rossillo srossillo at smartling.com
Thu Apr 23 10:47:17 EDT 2015


Thanks. By implementing the Spring Security adapter, I’m able to get around this by extending RequestAuthenticator. 


> On Apr 23, 2015, at 1:55 AM, Stian Thorgersen <stian at redhat.com> wrote:
> 
> Currently Keycloak adapters are only a way of integrating existing frameworks with Keycloak so adding a event handler etc wouldn't make much sense.
> 
> We have plans on the road-map for a CDI based adapter that gives more capabilities like what you're asking for, but in the mean time you'd need to look at PicketLink, DeltaSpike, or a way to do it with standard JEE security.
> 
> ----- Original Message -----
>> From: "Scott Rossillo" <srossillo at smartling.com>
>> To: "Bill Burke" <bburke at redhat.com>
>> Cc: keycloak-user at lists.jboss.org
>> Sent: Monday, 20 April, 2015 2:50:26 AM
>> Subject: Re: [keycloak-user] Keycloak Adapter without web.xml	security-constraint
>> 
>> Could we have a hook into application code to determine if a resource should
>> be protected by Keycloak? Maybe an event handler?
>> 
>> b oolean shouldProtectResourse(HttpServletRequest)
>> 
>> On Friday, April 17, 2015, Scott Rossillo < srossillo at smartling.com > wrote:
>> 
>> 
>> 
>> I could work around that for interactive logins, but it wouldn’t work for
>> application to application requests. Do you have any pointers on where I
>> could start to manually trigger the adapter?
>> 
>> Do you think it’s a reasonable requirement to have the application determine
>> if the adapter should be triggered? I feel it’s necessary for integration
>> with applications that have to support more than one authentication
>> mechanism.
>> 
>> Let me know.
>> 
>> Thanks in advance,
>> Scott
>> 
>> 
>> On Fri, Apr 17, 2015 at 4:46 PM, Bill Burke < bburke at redhat.com > wrote:
>> 
>> 
>> Our adapters need a security constraint or they won't be triggered.
>> 
>> On 4/17/2015 4:34 PM, Scott Rossillo wrote:
>>> When using a security mechanism, such as Spring Security, it’s possible
>>> that multiple security mechanisms are in place or that only parts of an
>>> application are secured via Keycloak, not a blanket path (e.g. /api/*).
>>> 
>>> What I’m trying to do is use the Spring’s authentication entrypoint to
>>> direct to Keycloak (this part work somewhat) and have the Keycloak
>>> adapter pick up from there (not working).
>>> 
>>> What’s the best way to handle this?
>>> 
>>> Thanks,
>>> Scott
>>> 
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> keycloak-user mailing list
>>> keycloak-user at lists.jboss.org
>>> https://lists.jboss.org/mailman/listinfo/keycloak-user
>>> 
>> 
>> --
>> Bill Burke
>> JBoss, a division of Red Hat
>> http://bill.burkecentral.com
>> _______________________________________________
>> keycloak-user mailing list
>> keycloak-user at lists.jboss.org
>> https://lists.jboss.org/mailman/listinfo/keycloak-user
>> 
>> 
>> _______________________________________________
>> keycloak-user mailing list
>> keycloak-user at lists.jboss.org
>> https://lists.jboss.org/mailman/listinfo/keycloak-user




More information about the keycloak-user mailing list