Skip to content

Instantly share code, notes, and snippets.

@abstractj
Last active May 17, 2016 14:51
Show Gist options
  • Save abstractj/4cd2231a472069d8b6f63b4008c74061 to your computer and use it in GitHub Desktop.
Save abstractj/4cd2231a472069d8b6f63b4008c74061 to your computer and use it in GitHub Desktop.
# From http://lists.jboss.org/pipermail/keycloak-user/2016-April/005869.html
KC_REALM=demo
KC_CLIENT=customer-portal
KC_CLIENT_SECRET=38df1c85-66e0-460d-bf37-26272f7e765f
KC_SERVER=localhost:8080
KC_CONTEXT=auth
# Request Tokens for credentials
KC_RESPONSE=$( \
curl -k -v -X POST \
-H "Content-Type: application/x-www-form-urlencoded" \
-d 'grant_type=client_credentials' \
-d "client_id=$KC_CLIENT" \
-d "client_secret=$KC_CLIENT_SECRET" \
"http://$KC_SERVER/$KC_CONTEXT/realms/$KC_REALM/protocol/openid-connect/token" | jq .
)
KC_ACCESS_TOKEN=$(echo $KC_RESPONSE| jq -r .access_token)
KC_ID_TOKEN=$(echo $KC_RESPONSE| jq -r .id_token)
KC_REFRESH_TOKEN=$(echo $KC_RESPONSE| jq -r .refresh_token)
#
## Show all keycloak env variables
set | grep KC_*
#
## Introspect Keycloak Request Token
curl -k -v \
-X POST \
-u "$KC_CLIENT:$KC_CLIENT_SECRET" \
-d "token=$KC_ACCESS_TOKEN" \
"http://$KC_SERVER/$KC_CONTEXT/realms/$KC_REALM/protocol/openid-connect/token/introspect"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment