Skip to content

Latest commit

 

History

History
40 lines (30 loc) · 1.07 KB

README.md

File metadata and controls

40 lines (30 loc) · 1.07 KB

javaee-keycloak-security

A simple JavaEE app which demonstrates how to secure a simple REST service using KEYCLOAK (IAM) by applying security constraints and roles to it's endpoint.

Installation Steps

  • Deploy to Wildfly

  • Get the access token ( use your own keycloak credentials )

    curl -X POST \
    http://localhost:8080/auth/realms/JavaSecurity/protocol/openid-connect/token \
    -H 'cache-control: no-cache' \
    -H 'content-type: application/x-www-form-urlencoded' \
    -H 'postman-token: e47beec0-2b7d-b4af-6504-bacf40d4d7bc' \
    -d 'grant_type=password&client_id=keycloak-demo&username=ashen&password=ashen'
    
  • Call Person API using above token

     curl -X POST \
    http://localhost:7070/keycloak-demo-service/keycloakDemoService/keycloak-demo/person/ashen \
    -H 'authorization: Bearer {accessToken}
    -H 'content-type: application/json' \
    -H 'postman-token: 04fec23a-acd7-a2d2-b76e-3882ba3f25e6' \
    -d '{}'
    
  • Expected Resposne

    {
      "PERSON_NAME": "ashen",
      "CLIENT_ID": "keycloak",
      "SUCESS": true
    }