On Wed, 2019-12-11 at 11:38 -0500, Cris Rockwell wrote:
> "What exactly would you need to manage JCR-based controls? I would
> imagine that mapping users to JCR groups based on whatever data your
> identity solution provides and then creating access based on ACLs
> only
> would satisfy your request."
> 
> 
> We need to manage a few things at the identity provider:
> 1. User attributes: username, name, email, phone, maybe a few other
> pieces of data about the user.
> 2. Group membership
> 
> When the user signs in, with SAML2 there is encrypted metadata which
> contains that information. Upon sign in, Sling users should be
> created, their user attributes updated and the user should be added
> or removed from Sling group membership. Once the user has signed in,
> then access is granted as usual using JCR-based ACL’s applied for the
> groups.

Right, I see that there is no support for that in the keycloak handler,
as it was presented [1].

I don't think there is any out-of-the-box support for what you're
looking for.

I would be happy to guide anyone willing to implement such
functionality though.

Thanks,
Robert


[1]: 
https://github.com/netdava/adapt-to-2018-keycloak-sling-presentation/tree/master/adapt-to-2018-sling-keycloak/org-apache-sling-auth-keycloak

Reply via email to