[keycloak-user] Client options for authenticating against Keycloak-secured services

Stian Thorgersen stian at redhat.com
Fri Mar 6 00:48:13 EST 2015



----- Original Message -----
> From: "Guy Davis" <guydavis.ca at gmail.com>
> To: keycloak-user at lists.jboss.org
> Sent: Monday, 2 March, 2015 11:38:43 PM
> Subject: [keycloak-user] Client options for authenticating against	Keycloak-secured services
> 
> Good day,
> 
> I'm hoping to summarize the methods for a client Java program to authenticate
> against a Keycloak-secured service endpoint. Please correct any
> misunderstandings I have in the summary below:
> 
> 
>     1. Client program can issue a KC REST API call to get a token and then
>     use it as "Authorization" header of type "Bearer" as per example
>     2. Client program (such as Apache HttpClient lib) can use Basic
>     Authorization if KC secured-deployment has been configured to allow.
>     3. Client program can negotiate a SAML v2.0 SP-initiated SSO session
>     directly against KC if the service is so configured.
>     4. Client program can negotiate a OpenID Connect SSO session directly
>     against KC if the service is so configured.
> 
> I have working Java examples now for #1 and #2, but was wondering if there
> were any Java examples of #3 and #4. Is my understanding of the
> authentication options for clients correct?

1 is a good option and it's just oauth resource owner password credentials. If possible embedding a webview (or using external browser to login) and using the standard login flow is a good option as well.

I'm not sure what you mean about 3 and 4. Both SAML and OpenID Connect are web based flows.

> 
> By the way, I am greatly impressed by the progress being made on the master
> branch around Kerberos/SPNEGO and Identity Brokering. Kudos to the team.
> 
> Thanks in advance,
> Guy
> 
> _______________________________________________
> keycloak-user mailing list
> keycloak-user at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-user


More information about the keycloak-user mailing list