keycloak-scim/examples/wildfly-demo
2014-01-16 12:52:46 +00:00
..
customer-app auth-server-url and Realm/App name changes 2014-01-15 10:02:56 -05:00
database-service Added third-party-cdi example. Example in both AS7 and Wildfly 2014-01-13 18:49:32 +01:00
product-app auth-server-url and Realm/App name changes 2014-01-15 10:02:56 -05:00
third-party auth-server-url and Realm/App name changes 2014-01-15 10:02:56 -05:00
third-party-cdi auth-server-url and Realm/App name changes 2014-01-15 10:02:56 -05:00
pom.xml Added third-party-cdi example. Example in both AS7 and Wildfly 2014-01-13 18:49:32 +01:00
README.md change uri scheme 2014-01-13 17:07:36 -05:00
testrealm.json KEYCLOAK-64 KEYCLOAK-246 Updated social to use update profile required action instead of registration form. Fixed Google provider 2014-01-16 12:52:46 +00:00

Login, Distributed SSO, Distributed Logout, and OAuth Token Grant Wildfly Examples

The following examples requires Wildfly 8.0.0. Here's the highlights of the examples

  • Delegating authentication of a web app to the remote authentication server via OAuth 2 protocols
  • Distributed Single-Sign-On and Single-Logout
  • Transferring identity and role mappings via a special bearer token (Skeleton Key Token).
  • Bearer token authentication and authorization of JAX-RS services
  • Obtaining bearer tokens via the OAuth2 protocol

There are multiple WAR projects. These will all run on the same WildFly instance, but pretend each one is running on a different machine on the network or Internet.

  • customer-app A WAR application that does remote login using OAuth2 browser redirects with the auth server
  • product-app A WAR application that does remote login using OAuth2 browser redirects with the auth server
  • database-service JAX-RS services authenticated by bearer tokens only. The customer and product app invoke on it to get data
  • third-party Simple WAR that obtain a bearer token using OAuth2 using browser redirects to the auth-server.

The UI of each of these applications is very crude and exists just to show our OAuth2 implementation in action.

This demo is meant to run on the same server instance as the Keycloak Server!

Step 1: Make sure you've set up the Keycloak Server

If you've downloaded the Keycloak Appliance Distribution, there is already a Wildfly distro all set up for you. This Wildfly distro has the adapter jboss modules all installed as well as the Keycloak Server all set up.

If you want to install Keycloak Server and run the demo on an existing Wildfly instance:

Obtain latest keycloak-war-dist-all.zip. This distro is used to install keycloak onto an existing JBoss installation

$ cd ${wildfly.home}/standalone
$ cp -r ${keycloak-war-dist-all}/deployments .

To install the adapter:

$ cd ${jboss.home}
$ unzip ${keycloak-war-dist-al}/adapters/keycloak-wildfly-adapter-dist.zip

Step 2: Boot Keycloak Server

Where you go to start up the Keycloak Server depends on which distro you installed.

From appliance: $ cd keycloak/bin $ ./standalone.sh

From existing Wildfly distro $ cd ${wildfly.home} $ ./standalone.sh

Step 3: Import the Test Realm

Next thing you have to do is import the test realm for the demo. Clicking on the below link will bring you to the create realm page in the Admin UI. The username/password is admin/admin to login in. Keycloak will ask you to create a new admin password before you can go to the create realm page.

http://localhost:8080/auth/admin/index.html#/create/realm

Import the testrealm.json file that is in the wildfly-demo/ example directory.

Step 4: Build and deploy

next you must build and deploy

  1. cd wildfly-demo
  2. mvn clean install
  3. mvn jboss-as:deploy

Step 5: Login and Observe Apps

Try going to the customer app and view customer data:

http://localhost:8080/customer-portal/customers/view.jsp

This should take you to the auth-server login screen. Enter username: bburke@redhat.com and password: password.

If you click on the products link, you'll be taken to the products app and show a product listing. The redirects are still happening, but the auth-server knows you are already logged in so the login is bypassed.

If you click on the logout link of either of the product or customer app, you'll be logged out of all the applications.

Step 6: Traditional OAuth2 Example

The customer and product apps are logins. The third-party app is the traditional OAuth2 usecase of a client wanting to get permission to access a user's data. To run this example open

http://localhost:8080/oauth-client

If you area already logged in, you will not be asked for a username and password, but you will be redirected to an oauth grant page. This page asks you if you want to grant certain permissions to the third-part app.

Admin Console

http://localhost:8080/auth/admin/index.html