Replies: 3 comments
-
|
Updated CLI command to use maven, and updated folders |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
Role support is now in Keycloak's main branch. |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
As announced to the community in this blog post, we are no longer developing the Map Store, and it will be removed from Keycloak's codebase. Follow #24111 for the removal steps. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
This post summarizes what the LDAP Map Storage provider can do today, how it can be tested and configured, and things to watch out. Comments provided to in this discussion will be used to update the original post.
The code is the main branch of Keycloak.
Audience, Goals, Status
Audience: (will change while development progresses)
Goal of the Map Storage Provider Family: Plugable storage back ends for the different first-class objects that will eventually support zero downtime upgrades, see https://github.com/keycloak/keycloak-community/blob/main/design/keycloak.x/storage-architecture.md
Goal of the LDAP Map Storage Provider: Map storage provider backed by an LDAP store. While LDAP will not be able to store all attributes needed for Keycloak, it should store as many as possible. Other attributes will be stored in other stores, and the tree store will combine them to a unified view.
Status: First support for roles in the main branch. Next up: users #9930
Supported Objects: Role
Supported Directory Servers: ApacheDS (other will eventually follow)
Known limitations:
Supported functionality for Roles
,).Setup of a test environment (minimal)
org.keycloak.testsuite.KeycloakServerwith the following parameters; the given properties will replace values in keycloak-server.jsonThis will use map storage with defaulting to concurrenthashmap store for all providers, only the role storage will use LDAP.
For development the Keycloak server can be restarted as often as needed as long as the ApacheDS server keeps its data.
cn=admin,ou=RealmRoles,dc=keycloak,dc=orgBeta Was this translation helpful? Give feedback.
All reactions