RestComm / restcomm-identity

GNU Affero General Public License v3.0
1 stars 4 forks source link

Implement custom keycloak authenticator #21

Open otsakir opened 8 years ago

otsakir commented 8 years ago

Implement a custom keycloak authenticator that will be able to handle stored passwords both in keycloak native format and as well as md5ed passwords originating from Restcomm migrated users.

otsakir commented 8 years ago

blocking issue https://issues.jboss.org/browse/KEYCLOAK-1900 was merged to keycloak:master.

otsakir commented 8 years ago

The password hashing SPI (custom keycloak authenticator) is ready. I implemented my own that uses a single md5 hashing but it seems it's not possible to create a single (or a group) of users directly using the hashed password. One has to go through the realm import operation. But this operation is an all-or-nothing thing in keycloak and i think for security reasons. So, it seems we can't just import the users of an old restcomm in the existing keycloak 'restcomm' realm. They can't be appended.

Further research and experimenting needs to be done.

The related discussion with keycloak support can be found here:

http://lists.jboss.org/pipermail/keycloak-user/2015-December/003928.html

upesh-m commented 7 years ago

Hi, I also did the same thing, created a custom password hash provider and dropped it to deployment folder. It got deployed successfully. Even though I have specified the algorithm name under hash algorithm field under password policy. Still its not picking up the algorithm. Its saying the algorithm is not found. Did you get any clue about the switch which will enable this algorithm?