[keycloak-user] Option to disable SPNEGO
Marek Posolda
mposolda at redhat.com
Thu Mar 28 04:05:27 EDT 2019
Thanks for the JIRA.
Marek
On 27/03/2019 21:35, Ryan Slominski wrote:
> Ticket created:
>
> https://issues.jboss.org/browse/KEYCLOAK-9927
> ------------------------------------------------------------------------
> *From:* Ryan Slominski
> *Sent:* Wednesday, March 27, 2019 3:55 PM
> *To:* Marek Posolda; keycloak-user
> *Subject:* Re: [keycloak-user] Option to disable SPNEGO
> The OIDC protocol "prompt=select_account" looks very interesting. I
> think this would be sufficient for handling "switch user".
>
> It actually look like "select account" is more sophisticated than
> "switch user" as it supports multiple users simultaneously and you
> choose a primary account. With switch user it is simply the ability to
> choose which user is logged in, but not necessarily more than one at a
> time. The fact "select account" is an OIDC standard makes it very
> appealing.
>
> It seems one of the Keycloak competitors has this:
>
> https://connect2id.com/products/server/docs/guides/select-account
>
> Is there an issue ticket for this already?
> ------------------------------------------------------------------------
> *From:* Marek Posolda <mposolda at redhat.com>
> *Sent:* Wednesday, March 27, 2019 3:36 PM
> *To:* Ryan Slominski; keycloak-user
> *Subject:* Re: [keycloak-user] Option to disable SPNEGO
> On 26/03/2019 21:02, Ryan Slominski wrote:
> > With the "LDAP" User Storage Provider you can configure
> authentication with a Kerberos password, but disable SPENGO. The
> admin web interface labels this "Allow Kerberos Authentication" (seems
> like a bad label). However, with the "Kerberos" User Storage Provider
> there is no such option. Is there a reason, or can this be added?
> It is not on the Kerberos provider as when you configured "Kerberos"
> provider, there is an assumption that you will want SPNEGO integration.
> >
> > Going a step further, the option to request SPENGO be disabled via
> url parameter (regardless of LDAP vs Kerberos User Storage Provider)
> was discussed years ago
> (https://gcc01.safelinks.protection.outlook.com/?url=http%3A%2F%2Flists.jboss.org%2Fpipermail%2Fkeycloak-dev%2F2015-October%2F005399.html&data=02%7C01%7Cryans%40jlab.org%7C9e96bb7576494bd6e90e08d6b2eb9612%7Cb4d7ee1f4fb34f0690372b5b522042ab%7C1%7C0%7C636893122238064707&sdata=bR8w8t8%2FLT8Bfp6Oy%2BS9b5VMoKOLukVWsasAJ3CCoKI%3D&reserved=0)
> with no resolution. Where are we with this? Either the parameter
> approach or some sort of support for "Switch User" would be
> appreciated because it is very tricky to accommodate with the current
> API. Currently I'm using a brokered identity provider which is a
> duplicate of the primary realm minus SPNEGO support. Then client
> applications are coded with a "switch user" link that uses the
> idp_hint parameter to indicate the special su brokered realm be
> used. Seems unnecessarily complex. Maybe I'm missing something
> easier?
>
> There is nothing easier ATM and nothing was done in the end.
>
> I was thinking about another option (maybe it was discussed in the
> thread, but not 100% sure...) to use "prompt=select_account" parameter
> supported by OIDC protocol. The original pupose of the
> "prompt=select_account" is maybe a bit different - it allows you to
> choose the account when you're somehow authenticated to multiple
> accounts. However I can see the usage for the use-cases like SPNEGO or
> X.509 authentication, that when the parameter is used, it will show the
> confirmation screen (aka "Is this you?" screen) where user will confirm
> that he wants to authenticate with his SPNEGO/X509 identity.
>
> Marek
>
> > _______________________________________________
> > keycloak-user mailing list
> > keycloak-user at lists.jboss.org
> >
> https://gcc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.jboss.org%2Fmailman%2Flistinfo%2Fkeycloak-user&data=02%7C01%7Cryans%40jlab.org%7C9e96bb7576494bd6e90e08d6b2eb9612%7Cb4d7ee1f4fb34f0690372b5b522042ab%7C1%7C0%7C636893122238064707&sdata=huRxdoPbDPtyBayZDCaE2jv3H8jPxSHqwL8utg5KoWo%3D&reserved=0
>
>
More information about the keycloak-user
mailing list