-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update home IdP discovery to use new SPI #235
Comments
@xgp I was looking at the old form of the Home IdP Discovery config. Is the 'Required a Verified Email' and 'Required a Verified Domain' still required? Are these our implementations? |
Yes. Those are for our implementations. We will still need 'Required a Verified Domain'
It looks like he added this to the default. |
Could you please give me a example on how to use the IdpSelectorAuthenticator? |
Done
It seems to me that our implementation flag "verifiedEmail" and the source flag "forwardUserWithUnverifiedEmail" have opposite logic @xpg. Does this impact our logic? How could we proceed without affecting the clients? |
I think we would have to run a "migration" in a |
Pulling the home idp extension is currently blocked by it not being in Maven Central. See sventorben/keycloak-home-idp-discovery#400 Going to try pulling the library in locally with the Maven <dependency>
<groupId>com.sample</groupId>
<artifactId>sample</artifactId>
<version>1.0</version>
<scope>system</scope>
<systemPath>${project.basedir}/src/main/resources/Name_Your_JAR.jar</systemPath>
</dependency> Interim plan if this ^^^ works:
|
Use some tricks
Hei @xgp . I've created a first example of how we could use the home idp extension as a library. There are several things that block us from using it as a library but I've created a PR on how to use it. Please check: https://github.com/p2-inc/keycloak-orgs/pull/259/files#diff-ca14b1065de1812332188294559f0f7398a15bb862c910f8d94fb83b1a6ce41b In order to start the project locally use the following config: |
Use some tricks
Use some tricks
@xgp from my point of view to be able to fully implement a authenticator using "home IdP discovery" as a library we would need the following:
In this way we could implement our custom Authenticator behaviour
|
sventorben/keycloak-home-idp-discovery#346
The text was updated successfully, but these errors were encountered: