Skip to content

hut36/moh-external-api-protocol-mapper

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

img

This repository contains a proof-of-concept Keycloak plug-in that adds extra claims to an OIDC token retrieved from an external REST API.

Installation

  1. Build the project by running mvn package.
  2. Copy the resulting JAR to Keycloak's standalone/deployments/ directory.

The JAR will be hot deployed, so Keycloak can be running or not.

Tested with:

  • Keycloak 9.0.2 (Docker image quay.io/keycloak/keycloak:9.0.2)
  • Maven 3.6.3

Configuration

The plugin is a custom OIDC Protocol Mapper, and it is configured like other mappers.

  1. Create a new client in Keycloak or use an existing one.
  2. Go to the "Mappers" tab.
  3. Click the "Create" button.
  4. In the "Mapper Type" drop-down, choose "External API".
  5. Configure the mapper, referring to the onscreen tooltips as needed.

Demoing

The plugin will execute whenever a token is generated. A fast way to get a token is to enable service accounts on the Keycloak client and then execute:

curl -s http://<your-keycloak-url>/auth/realms/master/protocol/openid-connect/token -d grant_type=client_credentials -d client_id=<client_id> -d client_secret=<client_secret>

The resulting JWT token can be decoded at https://jwt.io, but remember that a token is a credential and this is a public third-party website.

Another option is to deploy an example application capable of obtaining and inspecting tokens. I recommend Keycloak's demo JavaScript Example. You don't need to follow the steps given there, you just need to grab the index.html and keycloak.json files and deploy them anywhere handy. You will of course need to configure a public client on Keycloak and enter your settings in keycloak.json.

Example

In the screenshot below, we configure the custom mapper to retrieve a JSON attribute named "origin" from the https://httpbin.org/get API, and set it as a claim named "special":

image

In the screenshot below, we inspect the token in Keycloak's JavaScript Example:

image

Private SPI

During plugin installation, you may see this warning in the Keycloak log:

WARN [org.keycloak.services] (ServerService Thread Pool -- 65) KC-SERVICES0047: oidc-customprotocolmapper (com.cgi.CustomOIDCProtocolMapper) is implementing the internal SPI protocol-mapper. This SPI is internal and may change without notice

The protocol-mapper SPI has been available since at least Keycloak 4, and it's used by built-in mappers, so it's probably fairly stable.

Other documentation

Notes

  • Prior to Keycloak 7, Keycloak supported a mapper type called a "Script Mapper" that allowed administrators to define custom mappers right in the Admin GUI using Javascript. The ability to define scripts in the Admin GUI is deprecated, but the ability to implement custom OIDC protocol mappers in Javascript is still supported.

About

Keycloak OIDC protocol mapper demo.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Java 100.0%