-
Notifications
You must be signed in to change notification settings - Fork 129
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Keycloak 17+ #1024
Comments
would you consider sending a PR for this? I think it makes sense to add a separate keycloak18 config so that older versions continue to be supported |
@graemerocher I think the same, what do you think about the proposed solution above? Any naming or other recommendations? |
seems fine, will need to be documented though |
Thanks for the request @morki I think we have to support OpenID Connect RP-Initiated Logout 1.0. And I think we have to be able to specify whether you want to use that logout request or a custom. |
New version for this proposal can use property micronaut:
security:
oauth2:
clients:
internal:
enabled: true
client-id: xxx
client-secret: xxx
openid:
vendor: keycloak-17 # <-- this is the new property
issuer: xxx
end-session:
enabled: true This new version can be used for micronaut-projects/micronaut-test-resources#44 and will enable multiple versions of Keycloak for example. |
i just want to say that keycloak is version 21. |
Feature description
Keycloak 17
In Keycloak 17 the default distribution is powered by Quarkus and default endpoints has changed (removed the
/auth
prefix) so autoconfiguration ofEndSessionEndpoint
is failing.See #1009
Keycloak 18
In Keycloak 18 there are even bigger changes as shift to using standard OIDC logout and more. This means the
KeycloakEndSessionEndpoint
is not working anymore.The behaviour is now following OIDC standard and is working exactly as
OktaEndSessionEndpoint
.Proposed solution
Add new configuration property
mode
with following options:auto
(actual behavior usingEndSessionEndpointResolver
, backward compatible, default value)standard
(new behaviour, following the standard, using renamedOktaEndSessionEndpoint
)Example:
Current workaround for Keycloak 18
We successfuly tricked Micronaut to think that Keycloak is Okta by using
?okta
suffix for issuer URL e.g.https://sso.xxx.com/realms/master?okta
.The text was updated successfully, but these errors were encountered: