[keycloak-user] disable kerberos SSO when needed
Bill Burke
bburke at redhat.com
Thu Aug 18 15:10:13 EDT 2016
Filipe, wouldn't you just have your Client Cert Authenticator be
alternative and just use the "Forms" sub-flow structure that exists in
the built in "Browser" flow?
On 8/18/16 2:33 PM, Filipe Lautert wrote:
> Hello
>
> I've a similar case to this one, but instead of using an account page
> I use the ssl client certificate passed by Apache. I set up everything
> as the example you provided, but even if in my "Account Chooser Custom
> authenticator" I call AuthFlowContext.success() it is still showing me
> the username/password form from the next alternative flow.
>
> I worked around it creating a class called
> AlternativeUsernamePasswordFormFactory that
> extends UsernamePasswordFormFactory, and the only change that I did to
> it was to add the AuthenticationExecutionModel.Requirement.ALTERNATIVE
> to the REQUIREMENT_CHOICES . Now, if I set this new auth type as
> alternative in Keycloak, it does what I want.
>
> So my questions are: am I missing something to mark my Authenticator
> as sufficient to end the flow and return to the client? if not, is
> there a reason why UsernamePasswordFormFactory doesn't provide the
> ALTERNATIVE option, and can it be added to this class?
>
> I'm posting this again os this thread as Ray may face the same issue
> soon...
>
> Cheers
>
> filipe
>
> On Wed, Aug 17, 2016 at 6:38 PM Bill Burke <bburke at redhat.com
> <mailto:bburke at redhat.com>> wrote:
>
> You would need to create a custom authenticator that is like an
> account chooser page, i.e. two buttons one says "login to
> kerberos" the other says "login to ldap".
>
> A custom flow would look like this:
>
> * Cookie Authenticator
>
> * create an ALTERNATIVE sub flow
>
> * REQUIRED Account Chooser Custom authenticator page - if the
> kerberos button is clicked, call AuthFlowContext.success()
> otherwise AuthFLowContext.attempted(). Attempted will abort this
> alternative flow
>
> * REQUIRED Built in Kerberos Authenticator
>
> * create another ALTERNATIVE sub flow
>
> * REQUIRED built in username/password authenticator
>
>
> On 8/17/16 4:05 PM, Zhou, Limin (Ray) wrote:
>>
>> Hello
>>
>> Right now our keycloak server was setup to do kerberos
>> authentication with ldap as backup, so in this case, the user
>> will get them in automatically
>>
>> from the company domain when they hitting the URL, we have
>> application role definitions in the keycloak, if the user does
>> not have the role configured
>>
>> then we want to logout them back to the default key cloack login
>> page and let them try their LDAP user account.
>>
>> But because kerberos authentication is always on the top, so
>> right after we logout the user, the kerberos will let them in
>> automatically
>>
>> right now we are using keycloak.logout from keycloak.js to logout
>> user
>>
>> I am wondering what is the good practice to achieve this?
>>
>> Any suggestions are welcome
>>
>> thanks
>>
>> raymond
>>
>> ------------------------------------------------------------------------
>> Moneris Solutions Corporation | 3300 Bloor Street West | Toronto
>> | Ontario | M8X 2X2 | Canada www.moneris.com
>> <http://www.moneris.com> 1-866-319-7450
>> If you wish to unsubscribe from future updates from Moneris,
>> please click here
>> <https://www.moneris.com/en/About-Moneris/Contact-Moneris/Unsubscribe.aspx>.
>> Please see the Moneris Privacy Policy here
>> <http://www.moneris.com/Home/Legal/Website-Policies/Privacy-Policy.aspx>.
>>
>>
>> This e-mail may be privileged and/or confidential, and the sender
>> does not waive any related rights and obligations. Any
>> distribution, use or copying of this e-mail or the information it
>> contains by other than an intended recipient is unauthorized. If
>> you received this e-mail in error, please advise me (by return
>> e-mail or otherwise) immediately.
>> ------------------------------------------------------------------------
>> Corporation Solutions Moneris | 3300, rue Bloor Ouest | Toronto |
>> Ontario | M8X 2X2 | Canada www.moneris.com
>> <http://www.moneris.com> 1-866-319-7450
>> Si vous désirez enlever votre nom de la liste d’envoi de Moneris,
>> veuillez cliquer ici
>> <https://www.moneris.com/about-moneris/contact-moneris/unsubscribe?sc_lang=fr-CA>.
>> Veuillez consulter la Politique de confidentialité de Moneris ici
>> <http://www.moneris.com/Home/Legal/Website-Policies/Privacy-Policy.aspx?sc_lang=fr-CA%20>.
>>
>>
>> Ce courriel peut contenir des renseignements confidentiels ou
>> privilégiés, et son expéditeur ne renonce à aucun droit ni à
>> aucune obligation connexe. La distribution, l’utilisation ou la
>> reproduction du présent courriel ou des renseignements qu’il
>> contient par une personne autre que son destinataire prévu sont
>> interdites. Si vous avez reçu ce courriel par erreur, veuillez
>> m’en aviser immédiatement (par retour de courriel ou autrement).
>>
>>
>> _______________________________________________
>> keycloak-user mailing list
>> keycloak-user at lists.jboss.org <mailto:keycloak-user at lists.jboss.org>
>> https://lists.jboss.org/mailman/listinfo/keycloak-user
>
> _______________________________________________
> keycloak-user mailing list
> keycloak-user at lists.jboss.org <mailto:keycloak-user at lists.jboss.org>
> https://lists.jboss.org/mailman/listinfo/keycloak-user
>
> --
> filipe lautert
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/keycloak-user/attachments/20160818/a81ec11b/attachment.html
More information about the keycloak-user
mailing list