We have ran into an issue that has been giving us some hard time.
We are currently using the Keycloak Adapter subsystem to work with our application security. While trying to migrate to Wildfly 26.1.3.we switched to the out of the box Wildfly Elytron system with OIDC. We are not sure, if we are missing some configuration for this to work as needed, but at this time we are unable to propagate the already resolved security context over remote EJB calls(from one war deployment to another war deployment). When we reintroduced the Keycloak Adapter this does not seem to be an issue.
-------------------------------------------------------
T E S T S
-------------------------------------------------------
Running com.mihas.security.tests.ServletTest
Sending request to:
http://localhost:8080/service-one/HTTP Status: 200
HTTP principal: Name: 9302f4a1-5f37-4699-9971-ca6ff56bebc6, Type: org.wildfly.security.http.oidc.OidcPrincipal
Local EJB principal: Name: 9302f4a1-5f37-4699-9971-ca6ff56bebc6, Type: org.wildfly.security.http.oidc.OidcPrincipal
Remote EJB principal: Name: anonymous, Type: org.wildfly.security.auth.principal.AnonymousPrincipal
Sending request to:
http://localhost:8081/service-one/HTTP Status: 200
HTTP principal: Name: 9302f4a1-5f37-4699-9971-ca6ff56bebc6, Type: org.keycloak.KeycloakPrincipal
Local EJB principal: Name: 9302f4a1-5f37-4699-9971-ca6ff56bebc6, Type: org.keycloak.KeycloakPrincipal
Remote EJB principal: Name: 9302f4a1-5f37-4699-9971-ca6ff56bebc6, Type: org.keycloak.KeycloakPrincipal