-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow a user to authenticate in order to use the CLI #3
Comments
I've been looking at this for a while with little success. The most recent things I've tried are; Interacting with the default OIDC client before it's initiated. Some links to documentation |
this shows the basics - we need to used device flow - https://blog.please-open.it/device_code/ - with the cli being a different registered client to the ui |
In order to save out the key cloak config after changes you need to follow something like https://redmine.jb.man.ac.uk/issues/6642 |
I configured Keycloak with a new client and successfully tested device flow authentication with a few curl commands. I've added a rudimentary flow to the cli app that kicks off the authentication process, fires up a browser window and polls waiting for authentication to complete. When it's complete the default OIDC Client is used to retrieve an access token. This works initially, however, any subsequent api requests fail. Here's a section of Quarkus debug log;
Now investigating why the default client goes from having the tokens to immediately trying (and failing) to get them again. |
Ideally pop up a browser window to the same AAI as the GUI.
Successful authentication should return a token to the CLI that can be used for a series of commands.
The text was updated successfully, but these errors were encountered: