high-park-16144
07/04/2025, 12:32 PMhigh-park-16144
07/04/2025, 12:32 PM{
"json": {
"exec_id": "ax45bbq8d2rbxjlbpkpq",
"ns": "my-project-development",
"res_ver": "1068376961",
"routine": "worker-1",
"wf": "my-project:development:hello_world.hello_world_wf"
},
"level": "warning",
"msg": "Event recording failed. Error [EventSinkError: Error sending event, caused by [rpc error: code = Unauthenticated desc = authenticated user doesn't have required scope]]",
"ts": "2025-07-02T17:26:29Z"
}
Keycloak returns next scopes:
"scope":"all profile email access_token offline_access"
gorgeous-waitress-5026
07/07/2025, 5:55 PMall
scope needing to be added to your Keycloak client.gorgeous-waitress-5026
07/07/2025, 5:55 PMgentle-umbrella-41187
07/07/2025, 5:59 PMscope
claim vs. scp
claim. IIRC, in keycloak, you will need to set the scp
claim to something like:
"[\"all\"]"
gentle-umbrella-41187
07/07/2025, 6:00 PMThis is case when things are not conformant to the RFC and each OIDC provider implements them and have these pitfalls. In your case the provider you are using is conformant to use scope but the ones we have used like okta,azure ad, auth0 seems to use scp claims by default . there is no additional configuration that was needed to do this and hence probably was never included in the docs.
This is always a challenge with multiple implementations of the RFC and each provider some time choosing to deviate.
gentle-umbrella-41187
07/07/2025, 7:17 PM{
"protocol": "openid-connect",
"protocolMapper": "oidc-hardcoded-claim-mapper",
"name": "Flyte All Scope Claim",
"config": {
"claim.name": "scp",
"claim.value": "[\"all\"]",
"jsonType.label": "JSON",
"id.token.claim": "false",
"access.token.claim": "true",
"userinfo.token.claim": "false",
"introspection.token.claim": "true",
"access.tokenResponse.claim": "false"
}
}
And add it to the flytepropeller keycloak clienthigh-park-16144
07/07/2025, 7:21 PM