-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ARC-1222: Bootstrap Relying Party OIDC Server #8
Conversation
610118e
to
695638c
Compare
var baseUri = URI.create("https://t.oviva.io"); | ||
var validRedirectUris = | ||
List.of(URI.create("https://idp-test.oviva.io/auth/realms/master/broker/oidc/endpoint")); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
for now hardcoded, makes developing much faster
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe add an explicit TODO comment in code? so it easier to fetch it again later
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM in general, but why do you prefer to not create a Keycloak extension instead? Wouldn't it just be a matter of adding the custom JAR into the Keycloak docker image afterwards?
oidc-server/src/main/java/com/oviva/gesundheitsid/relyingparty/Main.java
Show resolved
Hide resolved
695638c
to
ebb24fc
Compare
ecad68b
to
86c35af
Compare
Quality Gate passedThe SonarCloud Quality Gate passed, but some issues were introduced. 15 New issues |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
great job 🎉
var baseUri = URI.create("https://t.oviva.io"); | ||
var validRedirectUris = | ||
List.of(URI.create("https://idp-test.oviva.io/auth/realms/master/broker/oidc/endpoint")); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe add an explicit TODO comment in code? so it easier to fetch it again later
This implements a very basic OpenID Connect IDP. The idea is to just defer authentication to this standalone bit from Keycloak. OIDC is supported out of the box.
This will imply an additional thing to deploy, but we will need minimal changes to Keycloak!
This PR adds a very basic implementation that can complete the authentication, but does not ask for credentials and also does not further deal with the actual gesundheits ID federation.
Next up will be wiring in GesundheitsID.
Other open todos: