Keycloak Security Implementation
Configuration of the Keycloak implementation of the Authenticator API.
| Property | Default | Description | 
|---|---|---|
causeway.security.keycloak.  | 
The base URL for the keycloak server. For example, if running a keycloak using Docker container, such as: docker run -p 9090:8080 \ -e KEYCLOAK_USER=admin \ -e KEYCLOAK_PASSWORD=admin \ quay.io/keycloak/keycloak:19.0.1 , then the URL would be "http://localhost:9090/auth".  | 
|
causeway.security.keycloak.  | 
If   | 
|
causeway.security.keycloak.  | 
true  | 
Whether to (attempt to) extract client roles and copy into the  By default, client roles are extracted using the "User Client Role" mapping type, into a token claim name "resource_access.${client_id}.roles" This has been made a configuration option because some versions of Keycloak seemingly do not correctly extract these roles, see for example this discussion and KEYCLOAK-9874.  | 
causeway.security.keycloak.  | 
true  | 
Whether to (attempt to) extract realm roles and copy into the  By default, realm roles are obtained from the token claims using the "User Realm Role" mapping type, into a token claim name "realm_access.roles" This has been made a configuration option because some versions of Keycloak seemingly do not correctly extract these roles, see for example this discussion and KEYCLOAK-9874.  | 
causeway.security.keycloak.  | 
Whether to (attempt to) extract any available roles and into the  This is to support any custom mapping type which maps into a token claim name called simply "roles" This has been made a configuration option so that the workaround described in this discussion and KEYCLOAK-9874 can be implemented.  | 
|
causeway.security.keycloak.  | 
/wicket  | 
Specifies where users will be redirected after authenticating successfully if they have not visited a secured page prior to authenticating or \{@code alwaysUse} is true.  | 
causeway.security.keycloak.realm  | 
The name of the realm for the Apache Causeway application, as configured in Keycloak.  | 
|
causeway.security.keycloak.  | 
If roles are to be extracted, this allows the resultant role to be optionally prefixed.  | 
|
causeway.security.keycloak.  | 
If   |