Is there a possibility to overwrite the “preferred_username” of an OIDC client that seems to be auto generated by Keycloak? If I have a client with e.g. name “something”, by getting the token there I can see the “preferred_username” which has the value “service-account-something”.
Can someone point me to a solution? Is there a way to overwrite it e.g. by mapper or by implementing a SPI?
The JS code:
token.setOtherClaims("preferred_username", "this is the new value");
(or just by returning the new value in the script code and configuring the mapper to fill the preferred_username claim when you configure the mapper in the KC admin console)
That doesn’t sound too difficult. I’ll try it out shortly. Thank you very much for the hint!
Did you find the solution to the above issue?
I am also using the Keycloak for one of our product. And we are using the client credentials grant flow to get the access token for service to service communication. And the issue is, preffered_username is coming as “service_account_test.” Our product also has a service account(e.g username_service) that needs to be embedded into the token, so that we have the activity logs for that service account.
So my question is,
- Am I using the correct grant flow for the use case.
- Can we embed something from the request into the token. Does the token endpoint takes additional attributes in the payload that can be added to the token?
Other things became more important. A test has not yet taken place. So I can’t confirm anything yet.
Yes, this is the usecase client credentials grant is made for.
I would check if an audience mapper will do the job. If you bind the mapper to a scope, the client is able to add the scope in the token request. so the client is able to specifiy viw the scope, what it needs to be in the access token.