--
You received this message because you are subscribed to the Google Groups "Keycloak User" group.
To unsubscribe from this group and stop receiving emails from it, send an email to keycloak-use...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/keycloak-user/c58534aa-c4d3-4042-92f9-4a94d1c39d27o%40googlegroups.com.
Hello Guillaume,The scenario you describe is quite common and a valid approach.However, you need to use the authorization code grant flow and a confidential client for the Keycloak OIDC Identity Provider integration.You can either use the existing "broker" confidential client with client-id / client-secret as the IdP broker client or create a dedicated confidential client.Note in both cases, you need to add the generated broker endpoint url "/endpoint/*" to the list of allowed redirect_uris.Cheers,Thomas
On Mon, 29 Jun 2020 at 17:23, guillaumearybak <guillau...@gmail.com> wrote:
Hello everyone !--I would like to do the following:- 1 keycloak on the internet, to handle login from everywhere.- 1 keycloak on a closed network (cut off from the internet) for security reasons to handle local authentication.The user's browser will have access to both networks (private and internet) and I would l like the user to be able to log on the isolated keycloak using it's account on the internet keycloak.I was planning to use the implicit flow of OpenID Connect but I can't seem to be able to configure it in the Identity Provider config page (in the isolated keycloak).Am I doing it wrong and Is it possible ?Regards.
You received this message because you are subscribed to the Google Groups "Keycloak User" group.
To unsubscribe from this group and stop receiving emails from it, send an email to keyclo...@googlegroups.com.