Open xgp opened 6 months ago
New Home IdP Discovery
@xgp I was looking at the old form of the Home IdP Discovery config.
Is the 'Required a Verified Email' and 'Required a Verified Domain' still required? Are these our implementations?
I believe this is the new 'verifiedEmail'
@rtufisi
Is the 'Required a Verified Email' and 'Required a Verified Domain' still required? Are these our implementations?
Yes. Those are for our implementations. We will still need 'Required a Verified Domain'
I believe this is the new 'verifiedEmail'
It looks like he added this to the default.
Could you please give me a example on how to use the IdpSelectorAuthenticator?
@rtufisi
Is the 'Required a Verified Email' and 'Required a Verified Domain' still required? Are these our implementations?
Yes. Those are for our implementations. We will still need 'Required a Verified Domain'
Done
I believe this is the new 'verifiedEmail'
It looks like he added this to the default.
It seems to me that our implementation flag "verifiedEmail" and the source flag "forwardUserWithUnverifiedEmail" have opposite logic @xpg. Does this impact our logic? How could we proceed without affecting the clients?
I think we would have to run a "migration" in a postInit
method to load all existing instances of our Authenticator and migrate their configurations.
Pulling the home idp extension is currently blocked by it not being in Maven Central. See https://github.com/sventorben/keycloak-home-idp-discovery/issues/400
Going to try pulling the library in locally with the Maven system
scope:
<dependency>
<groupId>com.sample</groupId>
<artifactId>sample</artifactId>
<version>1.0</version>
<scope>system</scope>
<systemPath>${project.basedir}/src/main/resources/Name_Your_JAR.jar</systemPath>
</dependency>
Interim plan if this ^^^ works:
libs/
directory in the keycloak-orgs repophasetwo-containers
repo, import it into the libs/ext/
dirREADME
that it is necessary to include the home idp jarHei @xgp . I've created a first example of how we could use the home idp extension as a library. There are several things that block us from using it as a library but I've created a PR on how to use it.
Please check: https://github.com/p2-inc/keycloak-orgs/pull/259/files#diff-ca14b1065de1812332188294559f0f7398a15bb862c910f8d94fb83b1a6ce41b
In order to start the project locally use the following config:
@xgp from my point of view to be able to fully implement a authenticator using "home IdP discovery" as a library we would need the following:
public final Authenticator create(KeycloakSession session) {
return new HomeIdpDiscoveryAuthenticator(this.discovererConfig);
}
In this way we could implement our custom Authenticator behaviour
https://github.com/sventorben/keycloak-home-idp-discovery/pull/346