[keycloak-user] KeycloakConfigResolver vs. unprotected resources

Bill Burke bburke at redhat.com
Mon Feb 1 09:26:16 EST 2016


Depends on the adapter.  Some/most platforms, the authenticator gets 
executed irregardless.

On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
> Hello,
>
> I have an application that is part of several realms. That's why I 
> implemented the KeycloakConfigResolver and it works fine.
> I observed that the KeycloakConfigResolver implementation gets called 
> even when unprotected resources of the application are requested. Is 
> there a (recommended) way how to avoid it? Or do I do something wrong?
>
> Thank you for the answer.
>
> Best regards,
> Bystrik
>
>
> _______________________________________________
> keycloak-user mailing list
> keycloak-user at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-user

-- 
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/keycloak-user/attachments/20160201/e457b41a/attachment.html 


More information about the keycloak-user mailing list