-
1. Re: JBPM 6.5.0 and Keycloak SSO
wmfarinha Aug 11, 2017 9:17 AM (in response to acos)Hello, did you install KC adapt, changed the standalone / configuration / standalone-full.xml xml?
Make a change to the Wildfly standalone.xml file.
Comment or remove this tag <single-sign-on path = "/" />
Then go to the WAR file (jbpm-console.WAR) and change the web.xml
Change the tag content to <auth-method> KEYCLOAK </ auth-method>
If you are making calls via REST please comment on this item as well.
<!-- Basic Auth Filter for REST and Maven2 repo -->
<!-- <filter>
<filter-name>HTTP Basic Auth Filter</filter-name>
<filter-class>org.uberfire.ext.security.server.BasicAuthSecurityFilter</filter-class>
<init-param>
<param-name>realmName</param-name>
<param-value>KIE Workbench Realm</param-value>
</init-param>
</filter>
<filter-mapping>
<filter-name>HTTP Basic Auth Filter</filter-name>
<url-pattern>/rest/*</url-pattern>
<url-pattern>/maven2/*</url-pattern>
<url-pattern>/ws/*</url-pattern>
</filter-mapping> -->
Add the following section to protect the accesses rest and ws by Keycloak.
<security-constraint>
<web-resource-collection>
<web-resource-name>remote-services</web-resource-name>
<url-pattern>/rest/*</url-pattern>
<url-pattern>/maven2/*</url-pattern>
<url-pattern>/ws/*</url-pattern>
</web-resource-collection>
<auth-constraint>
<role-name>rest-all</role-name>
</auth-constraint>
</security-constraint>
Copy the keycloak.json file (into the WAR) generated by the Realm installation of Keycloak. An example of this file is:
{
"realm": "REALM_NAME",
"auth-server-url": "http://localhost:8180/auth",
"enable-cors" : true,
"cors-max-age" : 1000,
"cors-allowed-methods" : "POST, PUT, DELETE, GET",
"ssl-required": "external",
"resource": "RESOURCE_NAME",
"principal-attribute": "preferred_username",
"credentials": {
"secret": "360f4bda-603e-4594-8cc9-13397c0c7d1d"
},
"use-resource-role-mappings": true
}
-
2. Re: JBPM 6.5.0 and Keycloak SSO
hcallejas Nov 30, 2017 9:50 PM (in response to acos)can you send the log file?? maybe the connection works fine and only need create the group in the realm