exlinc / keycloak-passport

Production-ready multi-realm implementation of a Keycloak Passport Strategy
https://exlskills.com/learn
Apache License 2.0
96 stars 22 forks source link

Example? #5

Open thebetterjort opened 5 years ago

thebetterjort commented 5 years ago

I'm trying to fully grasp keycloak passport + passport + next auth.

Do you have an example of how to do this ? Using your example, I get a authorizationURL is required.

thebetterjort commented 5 years ago

example open-id config

{ "issuer": "http://localhost:8080/auth/realms/demo", "authorization_endpoint": "http://localhost:8080/auth/realms/demo/protocol/openid-connect/auth", "token_endpoint": "http://localhost:8080/auth/realms/demo/protocol/openid-connect/token", "token_introspection_endpoint": "http://localhost:8080/auth/realms/demo/protocol/openid-connect/token/introspect", "userinfo_endpoint": "http://localhost:8080/auth/realms/demo/protocol/openid-connect/userinfo", "end_session_endpoint": "http://localhost:8080/auth/realms/demo/protocol/openid-connect/logout", "jwks_uri": "http://localhost:8080/auth/realms/demo/protocol/openid-connect/certs", "grant_types_supported": [ "authorization_code", "implicit", "refresh_token", "password", "client_credentials" ], "response_types_supported": [ "code", "none", "id_token", "token", "id_token token", "code id_token", "code token", "code id_token token" ], "subject_types_supported": [ "public" ], "id_token_signing_alg_values_supported": [ "RS256" ], "response_modes_supported": [ "query", "fragment", "form_post" ], "registration_endpoint": "http://localhost:8080/auth/realms/demo/clients-registrations/openid-connect" }

alallier commented 4 years ago

Ditto anyway to get a full working example here. I have it half working based on browsing this README and passport's documentation