I have a POC set up to test my configuration for AKHQ's new ACL structure using Direct OICD Mapping . To produce the needed JWT structure, I've created a custom protocol mapper in keycloak which adds the groups attribute and acls to the token. However, when I log into AKHQ, I can see this error in the pod logs, ... Exception during Authentication: use-oidc-claim config requires attribute groups in the OIDC claim despite groups being in both the id token and the access token for testing.
Here is a snippet of my configuration:
akhq:
default-group: no-roles
oidc:
enabled: true
providers:
keycloak:
label: "Login with Keycloak"
username-field: preferred_username
groups-field: groups
use-oidc-claim: true
And here is a sample of the id token that contains the groups attribute:
False alarm. I mixed the service account information in the configuration, so it was seeing a different token without the groups claim. All working now after setting the correct one.
I have a POC set up to test my configuration for AKHQ's new ACL structure using Direct OICD Mapping . To produce the needed JWT structure, I've created a custom protocol mapper in keycloak which adds the
groups
attribute and acls to the token. However, when I log into AKHQ, I can see this error in the pod logs,... Exception during Authentication: use-oidc-claim config requires attribute groups in the OIDC claim
despitegroups
being in both the id token and the access token for testing.Here is a snippet of my configuration:
And here is a sample of the id token that contains the
groups
attribute:I'm not sure what I am missing or what I am doing wrong, so hopefully someone can suggest something.