-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Service account #1220
Comments
The client credentials grant is fully supported and you can request any scopes you want, as long as they're whitelisted. |
From what I read in the documentation client creation rest api does not allow to specify custom claims or subject .. For my experience it is very useful to be able to configure a service account to be associated with the client |
The keycloak document shows very clearly that you can not just choose the subject (for good reasons). And it's also not very helpful to just dump a few links in here and say: yo please look at this and implement it. Either you put out a proper feature request (the templates aren't there for fun by the way) or there is no incentive to look at what you're trying to solve and even less so considering to implement it. |
Ok sorry here is the new feature request |
Allow to set custom claims and subject on an access token obtained with the Client Credentials Grant.
ie:
https://developers.google.com/identity/protocols/OAuth2ServiceAccount
https://www.keycloak.org/docs/latest/server_admin/index.html#_service_accounts
https://kubernetes.io/docs/reference/access-authn-authz/authentication/
The text was updated successfully, but these errors were encountered: