Hi All,Writing here to align my expectations for Quarkus + Keycloak OIDC + Primefaces. It works pretty good most of the time, but I'm having two major issues:
There is a chance it doesn't work because I'm doing something wrong, there is a bug somewhere or my expectations are wrong and it is not supported.For easy assessment I deployed the reproducing app https://dev.collarclubvernon.ca, connected it to GitHub and there is also a test user freya:prime. Feel free to use it for reproducing/assessing these issues. Please let me know if I need to change anything, open a bug or wait more for an answers on stackoverflow (i know everybody are super busy, so it's ok).
--Thanks in advance,Dmitry
You received this message because you are subscribed to the Google Groups "Quarkus Development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to quarkus-dev...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CAHaFQ1uM0uAcqxQgDnWg0RdNbkAxJ6-QW4OAasd_QHeFY%2Bx95Q%40mail.gmail.com.
HiOn Sat, Jul 1, 2023 at 10:21 PM Dmitry Shultz <dmi...@diligesoft.com> wrote:Hi All,Writing here to align my expectations for Quarkus + Keycloak OIDC + Primefaces. It works pretty good most of the time, but I'm having two major issues:I've missed this query, sorry.So, the problem is, Keycloak Authorization endpoint does not support cross origin redirects, which is whywe have this solution:The idea is to skip XHR and do the pure browser redirection which is not a problem.Give that a try please.404 is returned because for the logout path to remain a virtual path, you need to add something like:quarkus.http.auth.permission.logout.paths=/tenant-logout
quarkus.http.auth.permission.logout.policy=authenticatedOtherwise, the security system does not recognize this path requiring any verification and the JAX-RS endpoint or Vert.x route is invoked and you get 404,which also suggest how you can fix it without having to add a policy, add a no-op `/secure/logout` method - which is not the best solution but will work,Please see the code example at:
On Sun, Jul 2, 2023 at 12:36 PM Sergey Beryozkin <sbia...@redhat.com> wrote:HiOn Sat, Jul 1, 2023 at 10:21 PM Dmitry Shultz <dmi...@diligesoft.com> wrote:Hi All,Writing here to align my expectations for Quarkus + Keycloak OIDC + Primefaces. It works pretty good most of the time, but I'm having two major issues:I've missed this query, sorry.So, the problem is, Keycloak Authorization endpoint does not support cross origin redirects, which is whywe have this solution:The idea is to skip XHR and do the pure browser redirection which is not a problem.Give that a try please.
On Sun, Jul 2, 2023 at 12:36 PM Sergey Beryozkin <sbia...@redhat.com> wrote:HiOn Sat, Jul 1, 2023 at 10:21 PM Dmitry Shultz <dmi...@diligesoft.com> wrote:Hi All,Writing here to align my expectations for Quarkus + Keycloak OIDC + Primefaces. It works pretty good most of the time, but I'm having two major issues:I've missed this query, sorry.So, the problem is, Keycloak Authorization endpoint does not support cross origin redirects, which is whywe have this solution:The idea is to skip XHR and do the pure browser redirection which is not a problem.Give that a try please.404 is returned because for the logout path to remain a virtual path, you need to add something like:quarkus.http.auth.permission.logout.paths=/tenant-logout
quarkus.http.auth.permission.logout.policy=authenticatedOtherwise, the security system does not recognize this path requiring any verification and the JAX-RS endpoint or Vert.x route is invoked and you get 404,which also suggest how you can fix it without having to add a policy, add a no-op `/secure/logout` method - which is not the best solution but will work,Please see the code example at:I see you configured it as expected - I'll have a look early next week
# Logged-out users should be returned to the /welcome.html site which will offer an option to re-login:
quarkus.oidc.logout.post-logout-path=/secure/user/home.xhtml