Notes: Keycloak
A default "master" real is available, but it's not considered a good practice to use it
Some definitions
- Keycloak realm: a space where we manage objects: users, applications, roles and groups. A realm can shared/used for different applications if they share the same users and roles. A single realm interesting because we would have a single centralized identity managmeent server. It could also provide single sign on accross applications.
Creating a realm and users in it
- Create a custom realm for applications Give it name, mark it as enabled
- Create user, give him name, email (mark it as verified)
- Each user is given an ID, if a db is not configured, the user ID is stored in an embeded h2 database
- Give user credentials: username & password = test
-
To sign in to a different realm: go to
<KEYCLOAK_SERVER>/realms/<REALM_NAME>/account
-
A client = an application that requests auth on behalf of the user. Could a be a web UI, a backend API, etc...
Create client, make it OpenID There is distinction between "public client" and "confidential client" - A public client: cannot securely store a client secret (web UI) - A confidential client: appropriate for server to server conn
- Valid redirect URIs: URIs related to an app, for now putting test app available online at www.keycloak.org/app/*
- Web origins: Base address (of app ?)
-
Testing with test app: put local url of keycloak, realm name and client type After logging in, we fetch a token, the token is given by the server on
/realms/<REALM_NAME>/openid-connect/token
-
Another client: confidential client => Enable client authentication + tick service accounts roles No redirect/URIs needed We have client secret available, used to request an access token
Request an access token
We then send a URL encoded form request like this:
curl -k -X POST http://<KEYCLOAK_SERVER>/realms/testrealm/protocol/openid-connect/token \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=password&client_id=public-client&username=test&password=test&scope=email%20openid"
Note that the grant_type=password is not recommended.
And we get an access token in response. The access token is JWT which contains info about the user, the keycloak client used, the user ID, the roles... We also get a refresh token, which can be used to get a new access token. To use the refresh token:
curl -k -X POST http://<KEYCLOAK_SERVER>/realms/testrealm/protocol/openid-connect/token \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=refresh_token&client_id=public-client&refresh_token=<REFRESH_TOKEN>"
For the confidential client:
curl -k -X POST http://<KEYCLOAK_SERVER>/realms/testrealm/protocol/openid-connect/token \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=client_credentials&client_id=confidential-client&client_secret=<CLIENT_SECRET>&scope=openid"
This returns an access token and an ID token to authenticate against servers
Keycloak setup for applications
- Argo CD
Notes: Watch out for config maps
argocd-cm
andargocd-rbac-cm
. If you encounter issues about an incorrect redirect URL, check theurl
field in the former. If your user doesn't have sufficient rights after logging, check thepolicy.csv
field in the latter. - Proxmox Notes: Needs a confidential client. The client secret should be given to Proxmox when creating a realm. Users should be autocreated, role assignment however needs to be done manually on Proxmox
- pgadmin
Notes: The config file can be named
config_system.py
and put in/etc/pgadmin
. More setup parameters available here - Grafana Notes:
- The
root_url
option has to be set so the URL callback is correct if Grafana is behind a proxy -
The docs suggest using a jmespath expression to determine the role of the user based on their role in Keycloak. The suggested expression is
contains(roles[*], 'admin') && 'Admin' || contains(roles[*], 'editor') && 'Editor' || 'Viewer'
. However therole
attribute may not be effective for Keycloak. In the case of Keycloak, the role to be checked isresource_access.<CLIENT_ID>.roles
. This is a field which is mapped to the client (can be found at Client scopes > roles > Mappers > client roles > Token Claim Name). In addition to that, this mapping should be added either to ID token or userinfo for it to be effective. -
Portainer: oauth configuration
authorization url
: KEYLOAK_URL/realms/YOUR_REALM/protocol/openid-connect/authaccess token url
: KEYLOAK_URL/realms/YOUR_REALM/protocol/openid-connect/tokenresource url
: KEYLOAK_URL/realms/YOUR_REALM/protocol/openid-connect/userinforedirect url
: PORTAINER_URLlogout url
: KEYLOAK_URL/realms/YOUR_REALM/protocol/openid-connect/logoutuser identifier
: preferred_usernamescopes
: openid email profile offline_access roles
Make sure to also enable the automatic user provisioning