Replies: 3 comments 2 replies
-
Hi Enzo,
This would mean the keycloak module handles all the corresponding tokens and cookies now. The imixs-jwt module does not help you here because it is not aware of the sso login flow provided by keycloak. And you don't need it. For postman I guess you just need to provide the bearer token you got in the header request:
This seems to me be more a postman issue than an issue with wildfly/keycloak/imixs as you have already configured everything correct. I found this two links which which maybe helpful:
=== |
Beta Was this translation helpful? Give feedback.
-
Hi Ralph,
Could you please tell me with version of eclipselink to use with Wildfly 27? Enzo |
Beta Was this translation helpful? Give feedback.
-
Hi Ralph
didn't work. So i changed to:
and know it's ok!
the bearer authentication is working! :-) |
Beta Was this translation helpful? Give feedback.
-
Hi Ralph
I have successfully integrated imixis-jsf-example with "WildFly 26 Final" and "Keycloak 18".
When I try to access a resource of imixis-jsf-example the browser redirects to keycloak,
where the user authenticates with user/password and then the browser redirects to the imixis-jsf-example.
If an endpoint of imixis is called using Postman as client, ie
GET http://localhost:8080/imixs-jsf-example/api/workflow/worklist?format=json,
using the Cookie JSESSIONID to authenticate everything works fine.
Now I'm trying to use a bearer authorization, so I ask keycloak a token for my client_id with
POST http://127.0.0.1:8081/realms/master/protocol/openid-connect/token
and form-data:
I got the token and I try to use it as Bearer but it does not work.
The question is: how can I use keycloak token as bearer authorization.
I tried using the imixs-jwt module but I'm not able to set it up in WildFly 26.
Could you give me some help! :-)
Have a nice day!
Enzo
Beta Was this translation helpful? Give feedback.
All reactions