Closed vrijmetse closed 3 years ago
I'm facing the same issue using Keycloak as identity provider. My configuration works with jhipster-registry version 5.0.2 and 6.0.2 but using 6.1.2 or higher it fails
I applied this fix https://github.com/jhipster/jhipster-registry/pull/493 It should be in v6.6.0, can you try this version plz?
I also noticed similar issue on registry while testing out the keycloak upgrade. However, mine was only reproducible when I authenticate with user
.
V6.6.0 does not fix the issue for me
V6.7.1 same issue
All requests have no authorization header and the page says
The user role field must be named roles and to have the role of ROLE_ADMINYou are not authenticated. Please sign in
We have the same issue. This is a big problem. We can't properly work with JHipster Registry using oauth2 authentication and Keycloak. This is a problem with checking user permissions, and #501 might fix it.
Overview of the issue
I cant seem to make this work with AWS Cognito
Motivation for or Use Case
It would be great to make this work with Cognito since this service works well with other AWS services.
Reproduce the error
jhipster-registry.yml
tohttp://localhost:8761/oauth2/authorization/oidc
I can see the following calls in the network tab
https://www.example.com/oauth2/authorize?response_type=code&client_id=2q6l26cpiv62apg5iev05pb7nc&scope=openid%20email%20phone%20profile&state=OWNPVBzsIvYROAUh2ReAkuK8QlSwmwpwxGYbBphPbNM%3D&redirect_uri=http://localhost:8761/login/oauth2/code/oidc&nonce=UxN531_-oQWjF4qpzGgUF-IhQgxBdUEl5vCUkj8bfXQ
(which returns 302)http://localhost:8761/management/info
(200)http://localhost:8761/api/account
(403)Lastly it goes back to the first URL, and all the call are repeated endlessly....
Related issues
Suggest a Fix
JHipster Registry Version(s)
6.9
Browsers and Operating System
I tried this in Chrome on Ubuntu but I doubt this is related to the issue I am facing.