Skip to content
This repository has been archived by the owner on Aug 20, 2020. It is now read-only.

User JBoss Keycloak as an OpenID Connect provider #2

Open
eorlovsky opened this issue Dec 20, 2018 · 4 comments
Open

User JBoss Keycloak as an OpenID Connect provider #2

eorlovsky opened this issue Dec 20, 2018 · 4 comments

Comments

@eorlovsky
Copy link

Could you please help understand if we can use JBoss Keycloak as a database of users for Owncloud.
In Keycloak we can create a Client and have openid-connect endpoints

screen shot 2018-12-20 at 4 23 05 pm

screen shot 2018-12-20 at 4 23 17 pm

@mmattel
Copy link

mmattel commented Jan 15, 2019

@mmattel
Copy link

mmattel commented Jan 15, 2019

@PVince81 (Maybe a stupid) question:
Is it possible to extend the code in a way that both access_token and idToken are used/available?
https://github.com/owncloud/sociallogin/blob/c878ccf49100a36f74d47644112f685ef5262374/lib/Provider/CustomOpenIDConnect.php#L12

From the stackoverflow link above:

access_token is useful to call certain APIs in Auth0 (e.g. /userinfo) or an API you define in Auth0.
id_token is a JWT and represents the logged in user. It is often used by your app.

is it possible to use both the access_token and the id_token for accessing the protected resources ?

Not completely, first, you need to use id_token to log in, 
second, you will get a accessToken, 
last, use accessToken to access data.

Plus question:
is id_token something hat becomes empty when accessToken gets set (and vice versa). Or ist there a kind of precednece one over another? Which would mean that it would be distinguisable which one to chose

@PVince81
Copy link
Contributor

@rowe42
Copy link

rowe42 commented May 25, 2019

As saying in the referenced Issue above, I believe this issue can be closed.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants