Hildebrandt Tobias
01/28/2025, 2:45 PMscope in many different contexts.
And how to use them for rights management.
In KeyCloak there are client scopes and inside a client there is a tab Authorization that also has scopes let's call those authorization scopes.
The way I understood it is that client scopes that map to the "scope" claim inside the token just denote what is inside this token like the email or the profile.
You can assign client scopes to control what claims are getting added to the token.
Now there are authorization scopes that together with permissions and depending on roles/groups can evaluate to PERMIT or DENY.
These are often denoted with colons as in my:test:scope .
So I have a frontend, a backend, and a KeyCloak.
According to keycloak the Role Type policy Cancellation Access Policy has the dependent scope based permission Cancellation Access Permission which in turn
has the authorization scope : myapp:mymodule:cancel . But this information is not in the token. And I am at a loss at how to go on from here.kqr
01/29/2025, 9:33 AMHildebrandt Tobias
01/29/2025, 9:35 AMprofile and openid for example.
I am not fully sure how I connect the arbitrarily named scopes to the arbitrarily named permissions, but I do make progress.kqr
01/29/2025, 9:36 AMHildebrandt Tobias
01/29/2025, 9:37 AM