-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add HTTP Permission Layer #4349
Comments
@stuartwdouglas and as you suggested, lets have it pluggable so that the OIDC adapter can provide its own UMA/etc mechanism, @pedroigor FYI |
Currently we have different microservices with similar With the latest changes in Quarkus (v0.24) it seems that the Is it possible to keep the keycloak extension next to the oidc one until it has been clarified how to move forward with this issue as it is labeled version 1.0?
|
@dfranssen can you please clarify, is |
@dfranssen we will try to get an OIDC policy-enforcer for 0.25.0. apologies for the headaches with the migration... |
Not sure if it are claims, but more info on scopes in Keycloak. Please also have a look at #4376 as info is now on different issues |
@dfranssen I've put all your comments related to the policy-enforcer to #4495, lets work there |
There should be a generic interface that can be implemented to managed HTTP path permissions, that decide if a given SecurityIdentity can access a provided path+method combo.
By default this should support:
This will also support user defined constraints by allowing the user to implement an interface with a CDI bean.
The text was updated successfully, but these errors were encountered: