Using different RSA-SHA256 key providers for SAML AuthnRequest signing and JWT token signing in the same realm #44980
Unanswered
garteaga-symtrain
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Description
I am currently using Keycloak 18.0.0 and have a requirement to use different RSA-SHA256 key providers for different signing purposes within the same realm.
Although Keycloak allows creating multiple Key Providers in a realm using the RSA-SHA256 algorithm, only the provider configured with the highest priority is used for all signing operations. As a result, the same key is used for both:
Required Behavior
I need to be able to configure:
This separation is required because:
Current Limitation
At the moment, even though multiple RSA-SHA256 providers can be created in the realm, Keycloak always uses the highest-priority provider for both SAML and OIDC signing operations. Passive keys can be used for verification, but not selectively for signing.
Questions
Any feedback, best practices, or references to similar implementations would be greatly appreciated.
Beta Was this translation helpful? Give feedback.
All reactions