[keycloak-user] KeycloakConfigResolver vs. unprotected resources
Bill Burke
bburke at redhat.com
Mon Feb 1 09:26:16 EST 2016
Depends on the adapter. Some/most platforms, the authenticator gets
executed irregardless.
On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
> Hello,
>
> I have an application that is part of several realms. That's why I
> implemented the KeycloakConfigResolver and it works fine.
> I observed that the KeycloakConfigResolver implementation gets called
> even when unprotected resources of the application are requested. Is
> there a (recommended) way how to avoid it? Or do I do something wrong?
>
> Thank you for the answer.
>
> Best regards,
> Bystrik
>
>
> _______________________________________________
> keycloak-user mailing list
> keycloak-user at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-user
--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/keycloak-user/attachments/20160201/e457b41a/attachment.html
More information about the keycloak-user
mailing list