[keycloak-user] export of realm json
Stan Silvert
ssilvert at redhat.com
Tue Oct 6 07:04:46 EDT 2015
On 10/5/2015 3:18 PM, Marek Posolda wrote:
> Btv. Stan, is your work going to be added into 1.6 or is it for next
> release? I am just asking because there is one pending PR, which is
> likely going to be merged for 1.6 -
> https://github.com/keycloak/keycloak/pull/1656/files . After merging
> this, we discussed with Stian some additional minor changes (namely
> removing "zip" export/import provider as nobody doesn't seem to be
> using it so far). I should also doublecheck that import still works
> after those changes.
>
> I am going to look at this likely next week and it's going to be
> included in 1.6. I am asking as I don't want to edit same code like
> you and break something you're working on ;-)
It definitely won't make it for 1.6. I'm just getting started, figuring
out the requirements, and figuring out how it will all work.
>
> Marek
>
> On 05/10/15 20:33, Stan Silvert wrote:
>> On 10/5/2015 2:26 PM, Thomas Raehalme wrote:
>>>
>>>
>>> On Oct 5, 2015 21:24, "Bill Burke" <bburke at redhat.com> wrote:
>>> >
>>> > I'm still averse to allowing export from admin console of any
>>> > credentials or private keys.
>>>
>>> Even if they are not directly downloadable but require access to the
>>> server just like now?
>>>
>> I think there should be no secrets ever downloadable from admin
>> console. Admin console is, by definition, remote.
>>
>> If you have access to the server then you can use what is there now.
>>
>> It is possible, however, that when we do our CLI implementation we
>> can verify that the user is local and allow full access. That way,
>> you could do full export on a running server. WildFly CLI already
>> has logic to verify a user is local.
>>
>>>
>>> >
>>> > On 10/5/2015 2:02 PM, Stan Silvert wrote:
>>> > > I'm actually starting on the design and implementation of this right
>>> > > now. It's import/export from the admin console. It will also
>>> have the
>>> > > ability to import/export partial pieces of a realm such as just
>>> users.
>>> > >
>>> > > Thanks for the comments so far on this thread. They have been
>>> very helpful.
>>> > >
>>> > > We will keep the idea that no secrets should ever be exported
>>> from admin
>>> > > console. I'm not sure that having a flag for it in
>>> keycloak-server.json
>>> > > helps. To edit keycloak-server.json, you need access to the
>>> server, in
>>> > > which case you might as well do the current import/export.
>>> > >
>>> > > So what do you do after you import a user with no credentials?
>>> Some ideas:
>>> > > * The administrator can reset the password manually.
>>> > > * The user can do password recovery (if enabled)
>>> > >
>>> > > An other ideas?
>>> > >
>>> > > Stan
>>> > >
>>> > > On 10/5/2015 12:34 PM, Tim Dudgeon wrote:
>>> > >> That's a good point. Having to stop/start the server to generate an
>>> > >> export is not ideal.
>>> > >>
>>> > >> Tim
>>> > >>
>>> > >> On 05/10/2015 11:56, Thomas Raehalme wrote:
>>> > >>>
>>> > >>>
>>> > >>> On Mon, Oct 5, 2015 at 2:47 AM, Bill Burke <bburke at redhat.com
>>> <mailto:bburke at redhat.com>
>>> > >>> <mailto:bburke at redhat.com <mailto:bburke at redhat.com>>> wrote:
>>> > >>>
>>> > >>> On 10/4/2015 5:37 PM, Thomas Raehalme wrote:
>>> > >>>
>>> > >>>
>>> > >>> On Oct 4, 2015 23:57, "Bill Burke" <bburke at redhat.com
>>> <mailto:bburke at redhat.com>
>>> > >>> <mailto:bburke at redhat.com <mailto:bburke at redhat.com>
>>> <mailto:bburke at redhat.com <mailto:bburke at redhat.com>>>> wrote:
>>> > >>> >
>>> > >>> > For security reasons we did not want to have a remote
>>> > >>> option to export.
>>> > >>>
>>> > >>>
>>> > >>> How about just storing the export as a local file on the server?
>>> > >>> You'd need access to the server in order to get the file
>>> (making the
>>> > >>> system compromised anyways). The change to current behaviour
>>> is that
>>> > >>> you would be able to trigger the export at will without server
>>> restart.
>>> > >>>
>>> > >>> Best regards,
>>> > >>> Thomas
>>> > >>>
>>> > >>>
>>> > >>> _______________________________________________
>>> > >>> keycloak-user mailing list
>>> > >>> keycloak-user at lists.jboss.org
>>> <mailto:keycloak-user at lists.jboss.org>
>>> > >>> https://lists.jboss.org/mailman/listinfo/keycloak-user
>>> > >>
>>> > >>
>>> > >>
>>> > >> _______________________________________________
>>> > >> keycloak-user mailing list
>>> > >> keycloak-user at lists.jboss.org
>>> <mailto:keycloak-user at lists.jboss.org>
>>> > >> https://lists.jboss.org/mailman/listinfo/keycloak-user
>>> > >
>>> > >
>>> > >
>>> > > _______________________________________________
>>> > > keycloak-user mailing list
>>> > > keycloak-user at lists.jboss.org <mailto:keycloak-user at lists.jboss.org>
>>> > > https://lists.jboss.org/mailman/listinfo/keycloak-user
>>> > >
>>> >
>>> > --
>>> > Bill Burke
>>> > JBoss, a division of Red Hat
>>> > http://bill.burkecentral.com
>>> > _______________________________________________
>>> > keycloak-user mailing list
>>> > keycloak-user at lists.jboss.org <mailto:keycloak-user at lists.jboss.org>
>>> > https://lists.jboss.org/mailman/listinfo/keycloak-user
>>>
>>>
>>>
>>> _______________________________________________
>>> keycloak-user mailing list
>>> keycloak-user at lists.jboss.org
>>> https://lists.jboss.org/mailman/listinfo/keycloak-user
>>
>>
>>
>> _______________________________________________
>> keycloak-user mailing list
>> keycloak-user at lists.jboss.org
>> https://lists.jboss.org/mailman/listinfo/keycloak-user
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/keycloak-user/attachments/20151006/0446f66a/attachment.html
More information about the keycloak-user
mailing list