--
You received this message because you are subscribed to the Google Groups "Keycloak User" group.
To unsubscribe from this group and stop receiving emails from it, send an email to keycloak-use...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/keycloak-user/6a63747d-4659-4b10-80ca-c7d8930ef104n%40googlegroups.com.
It’s worth keeping in mind that authentication and authorization are different.
Authentication is the process of verifying that the user is truly the user they claim to be in Keycloak. Authorization is the process of verifying that the user has access to a resource.
OpenID Connect and SAML are both authentication protocols, although they both can send properties/attributes to the downstream app, which can be used for local authorization purposes. Or you can use Keycloak authorization services. While I haven’t used Keycloak authorization services, I think that if you use the UMA protocol, I think you do end up checking Keycloak for every page request.
But it sounds like you want to check on the Keycloak session status for every page load in app A and app B? With Keycloak, you can use “OAuth 2.0 Token Introspection” to check on the status of the Keycloak session.
Happy to be corrected, but that’s my understanding.
David Cook
Senior Software Engineer
Prosentient Systems
Suite 7.03
6a Glen St
Milsons Point NSW 2061
Australia
Office: 02 9212 0899
Online: 02 8005 0595
From: 'se...@xdam.com' via Keycloak User <keyclo...@googlegroups.com>
Sent: Wednesday, December 13, 2023 12:27 AM
To: Keycloak User <keyclo...@googlegroups.com>
Subject: Re: [keycloak-user] how keycloak can authorize user in cross domain?
I believe that depends on how the apps on A and B are coded. Typically OAuth apps will create their own sessions once they've confirmed the initial authorization, and only go back to Keycloak when those sessions are expired or lost.
To view this discussion on the web visit https://groups.google.com/d/msgid/keycloak-user/ec8db52b-6338-4d09-9e79-ac09ff7adbean%40googlegroups.com.