redhat-sso

Spring Boot Application using Keycloak, single sign on doesn't work behind an Apache Web Server

本小妞迷上赌 提交于 2021-01-29 07:40:30
问题 I have a Spring Boot + Spring Security application with RedhatSSO (Keycloak) as OIDC provider. This application is deployed on Openshift which assings it a route like this: http://my-app.cloud.mycompany.com/ . The application has this context path: /my-app . When I access a protected resource using the application's Openshift route address, http://my-app.cloud.mycompany.com/my-app/someProtectedResource , I am redirected to the Keycloak login page https://sso.mycompany.com where I login and I

Spring Boot Application using Keycloak, single sign on doesn't work behind an Apache Web Server

眉间皱痕 提交于 2021-01-29 07:31:37
问题 I have a Spring Boot + Spring Security application with RedhatSSO (Keycloak) as OIDC provider. This application is deployed on Openshift which assings it a route like this: http://my-app.cloud.mycompany.com/ . The application has this context path: /my-app . When I access a protected resource using the application's Openshift route address, http://my-app.cloud.mycompany.com/my-app/someProtectedResource , I am redirected to the Keycloak login page https://sso.mycompany.com where I login and I

Keycloak: roles not assigned when user is created via CLI

大憨熊 提交于 2020-01-03 03:58:19
问题 Running the below commands to import user with roles. ./kcadm.sh config credentials --server http://localhost:8080/auth --realm master --user admin --password [pass] ./kcadm.sh create users -r [realm_name] -f user-admin.json user-admin.json looks like: { "username": "adminLocal", "enabled": true, "totp": false, "emailVerified": false, "firstName": "admin", "lastName": "local", "email": "adminLocal@domain.com", "disableableCredentialTypes": ["password"], "requiredActions": [], "notBefore": 0,

Keycloak: roles not assigned when user is created via CLI

痴心易碎 提交于 2019-12-06 18:51:41
Running the below commands to import user with roles. ./kcadm.sh config credentials --server http://localhost:8080/auth --realm master --user admin --password [pass] ./kcadm.sh create users -r [realm_name] -f user-admin.json user-admin.json looks like: { "username": "adminLocal", "enabled": true, "totp": false, "emailVerified": false, "firstName": "admin", "lastName": "local", "email": "adminLocal@domain.com", "disableableCredentialTypes": ["password"], "requiredActions": [], "notBefore": 0, "access": { "manageGroupMembership": true, "view": true, "mapRoles": true, "impersonate": true, "manage