Hi
We have installed WF26 and configured elytron-oidc-client with secure-deployment so we can authenticate against our Keycloak server.
We used the secure-deployment to add our wars, just like the sample bellow:
<subsystem xmlns="urn:wildfly:elytron-oidc-client:1.0">
<realm name="MyRealm">
<auth-server-url>
https://my.auth.keyk.../</auth-server-url>
<ssl-required>NONE</ssl-required>
<enable-cors>true</enable-cors>
<principal-attribute>preferred_username</principal-attribute>
</realm>
<secure-deployment name="my-application-info-web.war">
<realm>MyRealm</realm>
<resource>myResource</resource>
<public-client>true</public-client>
</secure-deployment>
</subsystem>
This seams to work fine as we are able to access our secure webpages in the war and the user is logged in and do get the correct roles set.
But when the WAR try to connect to our EJB's that are deployed in another EAR the logged in user become "anonymous" and have none of the required roles and therefore no access when accessing our EJB's.
I have added ApplicationDomain to the ejb3 system:
<application-security-domains>
<application-security-domain name="other" security-domain="ApplicationDomain"/>
</application-security-domains>
Do the login with elytron-oidc-client get another securitydomain ?
Is there a way I can configure the security login from elytron-oidc-client so those users can reach our EJB layer.