Skip to content

Commit d98475b

Browse files
authored
Add a client that allows service accounts to connect (#618)
* Add a client that allows service accounts to connect * Remove bot and uma roles from sdk-service
1 parent ae3ab0b commit d98475b

File tree

1 file changed

+100
-3
lines changed

1 file changed

+100
-3
lines changed

authentication/import/aiod-realm.json

Lines changed: 100 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -282,6 +282,7 @@
282282
"attributes" : { }
283283
} ],
284284
"aiod-api-swagger" : [ ],
285+
"sdk-service" : [ ],
285286
"account" : [ {
286287
"id" : "84469ae7-2c55-421a-aaf0-8571415348dd",
287288
"name" : "manage-consent",
@@ -639,7 +640,7 @@
639640
"id" : "018afe4d-f82e-4fe9-aab6-1f98aa7c51cb",
640641
"clientId" : "aiod-sdk",
641642
"name" : "",
642-
"description" : "",
643+
"description" : "The client for allowing users to log in through a Device Grant flow with the Python SDK.",
643644
"rootUrl" : "",
644645
"adminUrl" : "",
645646
"baseUrl" : "",
@@ -661,6 +662,7 @@
661662
"protocol" : "openid-connect",
662663
"attributes" : {
663664
"client.secret.creation.time" : "1757941961",
665+
"post.logout.redirect.uris" : "+",
664666
"oauth2.device.authorization.grant.enabled" : "true",
665667
"backchannel.logout.revoke.offline.tokens" : "false",
666668
"use.refresh.tokens" : "true",
@@ -686,6 +688,7 @@
686688
"config" : {
687689
"user.session.note" : "client_id",
688690
"introspection.token.claim" : "true",
691+
"userinfo.token.claim" : "true",
689692
"id.token.claim" : "true",
690693
"access.token.claim" : "true",
691694
"claim.name" : "client_id",
@@ -700,6 +703,7 @@
700703
"config" : {
701704
"user.session.note" : "clientAddress",
702705
"introspection.token.claim" : "true",
706+
"userinfo.token.claim" : "true",
703707
"id.token.claim" : "true",
704708
"access.token.claim" : "true",
705709
"claim.name" : "clientAddress",
@@ -714,6 +718,7 @@
714718
"config" : {
715719
"user.session.note" : "clientHost",
716720
"introspection.token.claim" : "true",
721+
"userinfo.token.claim" : "true",
717722
"id.token.claim" : "true",
718723
"access.token.claim" : "true",
719724
"claim.name" : "clientHost",
@@ -778,6 +783,98 @@
778783
"nodeReRegistrationTimeout" : 0,
779784
"defaultClientScopes" : [ "web-origins", "acr", "roles", "profile", "email" ],
780785
"optionalClientScopes" : [ "address", "phone", "offline_access", "microprofile-jwt" ]
786+
}, {
787+
"id" : "21d5d2b7-28b5-4972-9fc0-48bea8508f72",
788+
"clientId" : "sdk-service",
789+
"name" : "",
790+
"description" : "A client that allows the Python SDK to connect a client secret. This may be useful for services. This type of authentication is under evaluation (Sept 2025).",
791+
"rootUrl" : "",
792+
"adminUrl" : "",
793+
"baseUrl" : "",
794+
"surrogateAuthRequired" : false,
795+
"enabled" : true,
796+
"alwaysDisplayInConsole" : false,
797+
"clientAuthenticatorType" : "client-secret",
798+
"secret" : "S2zo0zW6QMy8ffcqCozYbHkj0JajcWtQ",
799+
"redirectUris" : [ "/*" ],
800+
"webOrigins" : [ "/*" ],
801+
"notBefore" : 0,
802+
"bearerOnly" : false,
803+
"consentRequired" : false,
804+
"standardFlowEnabled" : false,
805+
"implicitFlowEnabled" : false,
806+
"directAccessGrantsEnabled" : false,
807+
"serviceAccountsEnabled" : true,
808+
"publicClient" : false,
809+
"frontchannelLogout" : true,
810+
"protocol" : "openid-connect",
811+
"attributes" : {
812+
"client.secret.creation.time" : "1758096058",
813+
"post.logout.redirect.uris" : "+",
814+
"oauth2.device.authorization.grant.enabled" : "false",
815+
"backchannel.logout.revoke.offline.tokens" : "false",
816+
"use.refresh.tokens" : "true",
817+
"oidc.ciba.grant.enabled" : "false",
818+
"client.use.lightweight.access.token.enabled" : "false",
819+
"backchannel.logout.session.required" : "true",
820+
"client_credentials.use_refresh_token" : "false",
821+
"tls.client.certificate.bound.access.tokens" : "false",
822+
"require.pushed.authorization.requests" : "false",
823+
"acr.loa.map" : "{}",
824+
"display.on.consent.screen" : "false",
825+
"token.response.type.bearer.lower-case" : "false"
826+
},
827+
"authenticationFlowBindingOverrides" : { },
828+
"fullScopeAllowed" : true,
829+
"nodeReRegistrationTimeout" : -1,
830+
"protocolMappers" : [ {
831+
"id" : "4f0aa88f-5a35-4beb-b6d1-4d99e04297d0",
832+
"name" : "Client Host",
833+
"protocol" : "openid-connect",
834+
"protocolMapper" : "oidc-usersessionmodel-note-mapper",
835+
"consentRequired" : false,
836+
"config" : {
837+
"user.session.note" : "clientHost",
838+
"introspection.token.claim" : "true",
839+
"userinfo.token.claim" : "true",
840+
"id.token.claim" : "true",
841+
"access.token.claim" : "true",
842+
"claim.name" : "clientHost",
843+
"jsonType.label" : "String"
844+
}
845+
}, {
846+
"id" : "ba9cf2f3-cc7a-4e25-a903-a34e858e8883",
847+
"name" : "Client ID",
848+
"protocol" : "openid-connect",
849+
"protocolMapper" : "oidc-usersessionmodel-note-mapper",
850+
"consentRequired" : false,
851+
"config" : {
852+
"user.session.note" : "client_id",
853+
"introspection.token.claim" : "true",
854+
"userinfo.token.claim" : "true",
855+
"id.token.claim" : "true",
856+
"access.token.claim" : "true",
857+
"claim.name" : "client_id",
858+
"jsonType.label" : "String"
859+
}
860+
}, {
861+
"id" : "3a7042a9-2e20-4e93-a538-5c96bf3e8379",
862+
"name" : "Client IP Address",
863+
"protocol" : "openid-connect",
864+
"protocolMapper" : "oidc-usersessionmodel-note-mapper",
865+
"consentRequired" : false,
866+
"config" : {
867+
"user.session.note" : "clientAddress",
868+
"introspection.token.claim" : "true",
869+
"userinfo.token.claim" : "true",
870+
"id.token.claim" : "true",
871+
"access.token.claim" : "true",
872+
"claim.name" : "clientAddress",
873+
"jsonType.label" : "String"
874+
}
875+
} ],
876+
"defaultClientScopes" : [ "web-origins", "acr", "roles", "profile", "email" ],
877+
"optionalClientScopes" : [ "address", "phone", "offline_access", "microprofile-jwt" ]
781878
}, {
782879
"id" : "0d2164c4-449d-4826-82e4-629307a6f2c5",
783880
"clientId" : "security-admin-console",
@@ -1319,7 +1416,7 @@
13191416
"subType" : "authenticated",
13201417
"subComponents" : { },
13211418
"config" : {
1322-
"allowed-protocol-mapper-types" : [ "saml-role-list-mapper", "oidc-usermodel-property-mapper", "oidc-full-name-mapper", "saml-user-attribute-mapper", "oidc-address-mapper", "saml-user-property-mapper", "oidc-usermodel-attribute-mapper", "oidc-sha256-pairwise-sub-mapper" ]
1419+
"allowed-protocol-mapper-types" : [ "oidc-usermodel-property-mapper", "saml-role-list-mapper", "oidc-address-mapper", "oidc-full-name-mapper", "oidc-sha256-pairwise-sub-mapper", "saml-user-property-mapper", "oidc-usermodel-attribute-mapper", "saml-user-attribute-mapper" ]
13231420
}
13241421
}, {
13251422
"id" : "10f8b9b2-1038-4c98-b7a5-a9ac88fed69e",
@@ -1361,7 +1458,7 @@
13611458
"subType" : "anonymous",
13621459
"subComponents" : { },
13631460
"config" : {
1364-
"allowed-protocol-mapper-types" : [ "oidc-usermodel-property-mapper", "oidc-address-mapper", "oidc-usermodel-attribute-mapper", "saml-user-attribute-mapper", "oidc-sha256-pairwise-sub-mapper", "oidc-full-name-mapper", "saml-user-property-mapper", "saml-role-list-mapper" ]
1461+
"allowed-protocol-mapper-types" : [ "saml-role-list-mapper", "saml-user-property-mapper", "oidc-sha256-pairwise-sub-mapper", "saml-user-attribute-mapper", "oidc-usermodel-property-mapper", "oidc-full-name-mapper", "oidc-usermodel-attribute-mapper", "oidc-address-mapper" ]
13651462
}
13661463
}, {
13671464
"id" : "1d21f027-e0ae-4b80-b95e-f21d9426f115",

0 commit comments

Comments
 (0)