question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

UI is trying to use keycloak as openid provider inspite of configuration to not do that

See original GitHub issue

Hi, I am building and running apicurio-registry using the following commands:

<git-cloned-location>/apicurio-registry ./mvnw clean package -DskipTests 
<git-cloned-location>/apicurio-registry ./mvnw quarkus:dev 

with the app application properties as follows:

# Okta TEST
quarkus.oidc.auth-server-url=https://dev-71378222.okta.com/oauth2/default
registry.auth.token.endpoint=https://dev-71378222.okta.com/oauth2/default/v1/token
quarkus.oidc.client-id=<Client-Id>
registry.auth.client-secret=<Client-Secret>
quarkus.oidc.application-type=web-app
quarkus.http.auth.permission.authenticated.paths=/*
quarkus.http.auth.permission.authenticated.policy=authenticated

quarkus.oidc.authentication.redirect-path=/callback
quarkus.oidc.authentication.restore-path-after-redirect=true

As you can see I am not using keycloak but OKTA. But the UI code tries to use keycloak as can be seen from the code here: https://github.com/Apicurio/apicurio-registry/blob/637b504cd06f39f1e96c91a78429f92ecc14bfc0/ui/src/services/config/config.service.ts#L140

How can I use OKTA and not KeyCloak as OpenID Connect Provider?

thanks

Issue Analytics

  • State:closed
  • Created 2 years ago
  • Comments:9 (7 by maintainers)

github_iconTop GitHub Comments

1reaction
RoopGuroncommented, Sep 27, 2021

@EricWittmann For some food for thought, you could take a look at how PassportJS is being utilized by other UI apps like backstage.io for instance.

1reaction
carlesarnalcommented, Sep 17, 2021

Hi @RoopGuron,

your understanding is correct. As Eric’s says, right now the UI is using keycloakjs for the authentication so it’s not possible to use anything else but Keycloak. That said, it’s on our backlog to address that so users are able to use any other OIDC provider.

In response to your last comment, Quarkus has a nice set of capabilities in the security area. They’re not bundled as a single library but as a set of quarkus extensions. You have a full list here.

Thanks for your comments.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Securing Applications and Services Guide - Keycloak
This section describes how you can secure applications and services with OpenID Connect using either Keycloak adapters or generic OpenID Connect Relying ...
Read more >
Using OpenID Connect (OIDC) and Keycloak to Centralize ...
Open a Dev UI available at /q/dev and click on a Provider: Keycloak link in an OpenID Connect Dev UI card. You will...
Read more >
Keycloak CORS issue when being redirected to login
Keycloak middleware detects that the user is not authenticated and responds to the request with a 302 (redirect) to a custom login page...
Read more >
Keycloak: Open-Source Identity and Access Management
The authorization server uses the public session identifier to look up all the details of the session (requested rights and scopes and who...
Read more >
Use OpenID Connect Support with JHipster - Okta Developer
You can even use Keycloak or Okta as your Identity Provider! ... If you want to know more about how OAuth and OIDC...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found