Hildebrandt Tobias
01/28/2025, 2:45 PMscope
in many different contexts.
And how to use them for rights management.
In KeyCloak there are client scopes
and inside a client
there is a tab Authorization
that also has scopes
let's call those authorization scopes
.
The way I understood it is that client scopes
that map to the "scope" claim inside the token just denote what is inside this token like the email or the profile.
You can assign client scopes
to control what claims are getting added to the token.
Now there are authorization scopes
that together with permissions and depending on roles/groups can evaluate to PERMIT or DENY.
These are often denoted with colons as in my:test:scope
.
So I have a frontend, a backend, and a KeyCloak.
According to keycloak the Role Type
policy Cancellation Access Policy
has the dependent scope based
permission Cancellation Access Permission
which in turn
has the authorization scope
: myapp:mymodule:cancel
. But this information is not in the token. And I am at a loss at how to go on from here.kqr
01/29/2025, 9:33 AMHildebrandt Tobias
01/29/2025, 9:35 AMprofile
and openid
for example.
I am not fully sure how I connect the arbitrarily named scopes to the arbitrarily named permissions, but I do make progress.kqr
01/29/2025, 9:36 AMHildebrandt Tobias
01/29/2025, 9:37 AM