-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extend Dev Services for Keycloak in Keycloak Authorization #21040
Comments
Hi @pedroigor @stuartwdouglas - this is a basic prototype - note it is really better be created directly in Keycloak by importing the realm or directly in Keycloak - at the devservices level it does not make sense to start mirroring a somewhat complex keycloak authorization permissions - ex, All this PR tries to achieve is to support a straightforward default case where it just works OOB immediately, something Daniel Oh was keen to demonstrate - which may be worth it as creating these permissions is somewhat involved even in the Keycloak UI. So KC DevServices has default Note I'm doing it all in So I'll likely push it down to |
@sberyozkin Can we hold this one a bit? The reason is that make this happen is a bit too complex due to how you configure resources/scopes/permissions/policies. Secondly, we are planning some changes next year in authz and this area is one we should focus more to improve. For instance, have a more easy/clear spec to configure things. |
@sberyozkin do you plan on resuming your #21276 effort? I can have a look into this, as I've already planned for longer time to get more familiar with Dev Services. @pedroigor changes in authz and this are are done, so this issue can be worked on, correc? (+ [very] optionally feel free to point out where to look for important changes) |
After thinking more about it, it appears to me that too much effort is required for a very minor gain, specifically, the whole idea of Dev Services for Keycloak creating a default realm with Alice and Bob allocated some roles is that it can be tested immediately against the endpoints with With Keycloak Authorization, it can't work at the default realm level, because it does not depend on
But it is not how these policies are configured in prod, and it would require users typing those mappings, which would defeat the purpose of the easy to start testing. I was thinking for a minute that maybe it would be great if DevUI could offer a way to configure Keycloak Authorization - but it would be complex to achieve and Keycloak itself has it all supported, it is all only a single click away from Dev UI - users click on |
Description
Right now, when
Dev Services for Keycloak
creates the default realm and client and users (when no custom realm is imported), this default realm has no keycloak authorization permissions for the defaultalice
andbob
users - this causes the confusion when startingquickstarts/security-keycloak-authorization
in a dev mode.Implementation ideas
Start introducing Dev Services for Keycloak authorization - it will simply catch the build item produced by Dev Services for KC and add the correct permissions for the default users
The text was updated successfully, but these errors were encountered: