Support for Keycloak Role permission #843
bakousylla
started this conversation in
General
Replies: 1 comment 4 replies
-
|
You can use a User Realm Role mapper to add role information to the FWIW: by design the access token is meant to be opaque to the OAuth 2.0 Client i.e. mod_auth_openidc so you should not be looking to pull claims from there. |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
I want to thanks for this great work!
We are facing the same issue than here : https://github.com/zmartzone/mod_auth_openidc/issues/297
Keycloak OAuth2 server send user's roles:
in the access token,
in the json structure : realm_access.roles[]
So we would like to have a base url filtered on a specific role, something like :
AuthType openid-connect
Require valid-user
Require claim realm_access.roles:MY_APP_ROLE
But it's not working and all not authorized users can access on my application. Could you have the solution for this issue ?
Thanks on advance.
Environment
Name : mod_auth_openidc
Arch : x86_64
Version : 2.4.11.1
Release : 1.el7
Name : httpd
Arch : x86_64
Version : 2.4.52
Release : 1.amzn2
Operating System: Amazon Linux 2
Kernel: Linux 4.14.273-207.502.amzn2.x86_64
Beta Was this translation helpful? Give feedback.
All reactions