Forked from thomasdarimont/KeycloakAdminClientExample.java
Created
December 19, 2020 15:34
-
-
Save jachinte/ad33752d561dbd6f3fb4c7103cec1b3b to your computer and use it in GitHub Desktop.
Simple example for creating a User with Keycloaks Admin Client - with credentials, custom roles, and user attributes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package de.tdlabs.keycloak.client; | |
import java.util.Arrays; | |
import java.util.Collections; | |
import javax.ws.rs.core.Response; | |
import org.keycloak.OAuth2Constants; | |
import org.keycloak.admin.client.Keycloak; | |
import org.keycloak.admin.client.KeycloakBuilder; | |
import org.keycloak.admin.client.resource.RealmResource; | |
import org.keycloak.admin.client.resource.UsersResource; | |
import org.keycloak.representations.idm.ClientRepresentation; | |
import org.keycloak.representations.idm.CredentialRepresentation; | |
import org.keycloak.representations.idm.RoleRepresentation; | |
import org.keycloak.representations.idm.UserRepresentation; | |
public class KeycloakAdminClientExample { | |
public static void main(String[] args) { | |
String serverUrl = "http://sso.tdlabs.local:8899/u/auth"; | |
String realm = "javaland"; | |
String clientId = "idm-client"; | |
String clientSecret = "a200cdf6-ad72-4f6c-af73-5b8e1cc48876"; | |
// // Client "idm-client" needs service-account with at least "manage-users, view-clients, view-realm, view-users" roles for "realm-management" | |
// Keycloak keycloak = KeycloakBuilder.builder() // | |
// .serverUrl(serverUrl) // | |
// .realm(realm) // | |
// .grantType(OAuth2Constants.CLIENT_CREDENTIALS) // | |
// .clientId(clientId) // | |
// .clientSecret(clientSecret).build(); | |
// User "javaland" needs at least "manage-users, view-clients, view-realm, view-users" roles for "realm-management" | |
Keycloak keycloak = KeycloakBuilder.builder() // | |
.serverUrl(serverUrl) // | |
.realm(realm) // | |
.grantType(OAuth2Constants.PASSWORD) // | |
.clientId(clientId) // | |
.clientSecret(clientSecret) // | |
.username("idm-admin") // | |
.password("admin") // | |
.build(); | |
// Define user | |
UserRepresentation user = new UserRepresentation(); | |
user.setEnabled(true); | |
user.setUsername("tester1"); | |
user.setFirstName("First"); | |
user.setLastName("Last"); | |
user.setEmail("[email protected]"); | |
user.setAttributes(Collections.singletonMap("origin", Arrays.asList("demo"))); | |
// Get realm | |
RealmResource realmResource = keycloak.realm(realm); | |
UsersResource userRessource = realmResource.users(); | |
// Create user (requires manage-users role) | |
Response response = userRessource.create(user); | |
System.out.println("Repsonse: " + response.getStatusInfo()); | |
System.out.println(response.getLocation()); | |
String userId = response.getLocation().getPath().replaceAll(".*/([^/]+)$", "$1"); | |
System.out.printf("User created with userId: %s%n", userId); | |
// Get realm role "tester" (requires view-realm role) | |
RoleRepresentation testerRealmRole = realmResource.roles()// | |
.get("tester").toRepresentation(); | |
// Assign realm role tester to user | |
userRessource.get(userId).roles().realmLevel() // | |
.add(Arrays.asList(testerRealmRole)); | |
// Get client | |
ClientRepresentation app1Client = realmResource.clients() // | |
.findByClientId("app-javaee-petclinic").get(0); | |
// Get client level role (requires view-clients role) | |
RoleRepresentation userClientRole = realmResource.clients().get(app1Client.getId()) // | |
.roles().get("user").toRepresentation(); | |
// Assign client level role to user | |
userRessource.get(userId).roles() // | |
.clientLevel(app1Client.getId()).add(Arrays.asList(userClientRole)); | |
// Define password credential | |
CredentialRepresentation passwordCred = new CredentialRepresentation(); | |
passwordCred.setTemporary(false); | |
passwordCred.setType(CredentialRepresentation.PASSWORD); | |
passwordCred.setValue("test"); | |
// Set password credential | |
userRessource.get(userId).resetPassword(passwordCred); | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment