(SPA + keycloack + OIDC) Getting notified to add extra check after login #50227
-
We have a SPA getting token from Keycloack; this token is sent to our Quarkus service as barrier and validated using oidc extensions.
Currently we have a Thanks, Luca. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 3 replies
-
/cc @pedroigor (oidc), @sberyozkin (oidc) |
Beta Was this translation helpful? Give feedback.
-
The application can listen on the authentication failure events and revoke tokens, see the second example at https://quarkus.io/guides/security-oidc-code-flow-authentication#oidc-token-revocation, see also https://quarkus.io/guides/security-customization#observe-security-events
Re the token modification, what exactly do you have in mind, we have API that can take an existing JWT in and build a new one, but it requires having access to the private signing key...
Right, if this user session is not needed to actually augment the identity, then retrieving it should probably not be done in the augmentor... Hmm... Using the JAX-RS filter might work, perhaps another option is to also register a custom Also, some users use SPA with Quarkus OIDC itself doing the authorization code flow and managing the session cookie... |
Beta Was this translation helpful? Give feedback.
Hi @luca-bassoricci
The application can listen on the authentication failure events and revoke tokens, see the second example at https://quarkus.io/guides/security-oidc-code-flow-authentication#oidc-token-revocation, see also https://quarkus.io/guides/security-customization#observe-security-events
Re the token modification, what exactly do you have in…