Keycloak service account linked to custom User Storage identity











up vote
0
down vote

favorite












We have a a Keycloak realm backed by a custom User Storage provider. The identity store behind this provider is legacy, and we are unlikely to replace it with keycloak's internal storage.



We use this very effectively for our web application using "authorization code grant" and the keycloak-spring-security adaptor. We use protocol mappers to add additional claims from our identity store to the access token. This is all part of our legacy authorization scheme. This all works great.



Now we want to expose a set of our API's to our partners/customers for them to use in their applications. We want to provide access to our partners through a simple "client credentials grant" and a single service account. I can set this up easily, however, we need this service account to be bound to one of the users in our identity store and take on the associated claims.



Is this possible?



---Edit---



I considered using Resource Owner Password Credentials Grant" but I would prefer this client to have access to a single service account authorized by the client secret. I don't want additional password credentials, and I don't want to maintain password policies for service accounts.



We have no plans on implementing a user federation scheme with our partners, and we cannot assume our partners will be using this for interactive, user-driven applications.










share|improve this question
























  • I'm thinking a custom Authentication Provider might be the answer. Hoping for something simpler.
    – dsmith
    Nov 22 at 17:52















up vote
0
down vote

favorite












We have a a Keycloak realm backed by a custom User Storage provider. The identity store behind this provider is legacy, and we are unlikely to replace it with keycloak's internal storage.



We use this very effectively for our web application using "authorization code grant" and the keycloak-spring-security adaptor. We use protocol mappers to add additional claims from our identity store to the access token. This is all part of our legacy authorization scheme. This all works great.



Now we want to expose a set of our API's to our partners/customers for them to use in their applications. We want to provide access to our partners through a simple "client credentials grant" and a single service account. I can set this up easily, however, we need this service account to be bound to one of the users in our identity store and take on the associated claims.



Is this possible?



---Edit---



I considered using Resource Owner Password Credentials Grant" but I would prefer this client to have access to a single service account authorized by the client secret. I don't want additional password credentials, and I don't want to maintain password policies for service accounts.



We have no plans on implementing a user federation scheme with our partners, and we cannot assume our partners will be using this for interactive, user-driven applications.










share|improve this question
























  • I'm thinking a custom Authentication Provider might be the answer. Hoping for something simpler.
    – dsmith
    Nov 22 at 17:52













up vote
0
down vote

favorite









up vote
0
down vote

favorite











We have a a Keycloak realm backed by a custom User Storage provider. The identity store behind this provider is legacy, and we are unlikely to replace it with keycloak's internal storage.



We use this very effectively for our web application using "authorization code grant" and the keycloak-spring-security adaptor. We use protocol mappers to add additional claims from our identity store to the access token. This is all part of our legacy authorization scheme. This all works great.



Now we want to expose a set of our API's to our partners/customers for them to use in their applications. We want to provide access to our partners through a simple "client credentials grant" and a single service account. I can set this up easily, however, we need this service account to be bound to one of the users in our identity store and take on the associated claims.



Is this possible?



---Edit---



I considered using Resource Owner Password Credentials Grant" but I would prefer this client to have access to a single service account authorized by the client secret. I don't want additional password credentials, and I don't want to maintain password policies for service accounts.



We have no plans on implementing a user federation scheme with our partners, and we cannot assume our partners will be using this for interactive, user-driven applications.










share|improve this question















We have a a Keycloak realm backed by a custom User Storage provider. The identity store behind this provider is legacy, and we are unlikely to replace it with keycloak's internal storage.



We use this very effectively for our web application using "authorization code grant" and the keycloak-spring-security adaptor. We use protocol mappers to add additional claims from our identity store to the access token. This is all part of our legacy authorization scheme. This all works great.



Now we want to expose a set of our API's to our partners/customers for them to use in their applications. We want to provide access to our partners through a simple "client credentials grant" and a single service account. I can set this up easily, however, we need this service account to be bound to one of the users in our identity store and take on the associated claims.



Is this possible?



---Edit---



I considered using Resource Owner Password Credentials Grant" but I would prefer this client to have access to a single service account authorized by the client secret. I don't want additional password credentials, and I don't want to maintain password policies for service accounts.



We have no plans on implementing a user federation scheme with our partners, and we cannot assume our partners will be using this for interactive, user-driven applications.







oauth-2.0 keycloak






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Nov 22 at 16:45

























asked Nov 22 at 15:48









dsmith

1,780913




1,780913












  • I'm thinking a custom Authentication Provider might be the answer. Hoping for something simpler.
    – dsmith
    Nov 22 at 17:52


















  • I'm thinking a custom Authentication Provider might be the answer. Hoping for something simpler.
    – dsmith
    Nov 22 at 17:52
















I'm thinking a custom Authentication Provider might be the answer. Hoping for something simpler.
– dsmith
Nov 22 at 17:52




I'm thinking a custom Authentication Provider might be the answer. Hoping for something simpler.
– dsmith
Nov 22 at 17:52

















active

oldest

votes











Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53434454%2fkeycloak-service-account-linked-to-custom-user-storage-identity%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown






























active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.





Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


Please pay close attention to the following guidance:


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53434454%2fkeycloak-service-account-linked-to-custom-user-storage-identity%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

What visual should I use to simply compare current year value vs last year in Power BI desktop

Alexandru Averescu

Trompette piccolo