Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit320e7e6

Browse files
authored
Sso keycloak (#677)
* Add sso for keycloakAdded OIDC SSO for Keycloak* Update oidc-keycloak.mdAdded note on KeycloakServer version* Update keycloak ssoAdded link to Keycloak from OIDC topic, and added related links to Keycloak topic* Update oidc-keycloak.md* Update oidc-keycloak.mdFixed workaround parameter* Update team syncRemoved note on provider support for team sync* Update oidc-keycloak.md
1 parentf103ea6 commit320e7e6

12 files changed

+132
-2
lines changed

‎_data/nav.yml‎

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -560,6 +560,8 @@
560560
url:/oidc-azure
561561
-title:Google
562562
url:/oidc-google
563+
-title:Keycloak
564+
url:/oidc-keycloak
563565
-title:Okta
564566
url:/oidc-okta
565567
-title:OneLogin

‎_docs/single-sign-on/oidc.md‎

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ Here's what you need to do to configure SSO via OIDC in Codefresh:
2929
*[Auth0]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-auth0/)
3030
*[Azure]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-azure/)
3131
*[Google]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-google/)
32+
*[Keycloak]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-keycloak/)
3233
*[Okta]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-okta/)
3334
*[OneLogin]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-onelogin/)
3435

Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title:"Keycloak SSO via OIDC"
3+
description:"Set up Keycloak SSO for OIDC"
4+
group:single-sign-on
5+
toc:true
6+
---
7+
Set up SSO for Keycloak using OIDC.
8+
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({{site.baseurl}}/docs/single-sign-on/oidc).
9+
10+
Set up OIDC SSO for Keycloak in Codefresh by:
11+
1. Creating a client in Keycloak
12+
1. Configuring SSO settings for Keycloak in Codefresh
13+
1. Configuring redirect URIs in Keycloak
14+
15+
>**IMPORTANT**:
16+
>KeycloakServer changed`/auth` endpoint from version 17.0.0. Currently, Codefresh does not support Keycloak version 17.0.0 or higher.
17+
>As a workaround, start KeycloakServer with this parameter:`--http-relative-path=/auth/`.
18+
19+
20+
##Step 1: Create Client in Keycloak
21+
22+
Create a Keycloak client for Codefresh.
23+
24+
1. Log in to Keycloak.
25+
1. Select the Realm, and from the sidebar, select**Clients**.
26+
1. Click**Create Client**, and the**Clients list** tab.
27+
1. Define the General Settings:
28+
1. From the**Client type** drop-down, select**OpenID Connect**.
29+
1. In the**Client ID** field, enter`g.codefresh.io`.
30+
1. In the**Name** field, enter a display name for the client, for example,`Codefresh`.
31+
1. Click**Next**.
32+
33+
{% include image.html
34+
lightbox="true"
35+
file="/images/sso/keycloak/create-client-general-settings.png"
36+
url="/images/sso/keycloak/create-client-general-settings.png"
37+
alt="General Settings for Codefresh client in Keycloak"
38+
caption="General Settings for Codefresh client in Keycloak"
39+
max-width="70%"
40+
%}
41+
42+
{:start="5"}
43+
1. Define the Capablity config settings:
44+
1. Toggle**Client authentication** to ON.
45+
1. Click**Save**.
46+
47+
{% include image.html
48+
lightbox="true"
49+
file="/images/sso/keycloak/create-client-capability-config-settings.png"
50+
url="/images/sso/keycloak/create-client-capability-config-settings.png"
51+
alt="Capablity config settings for Codefresh client in Keycloak"
52+
caption="Capablity config settings for Codefresh client in Keycloak"
53+
max-width="70%"
54+
%}
55+
56+
{:start="6"}
57+
1. Copy and paste the following:
58+
1. Go back to Settings.
59+
1. From the General Settings tab, copy the**Client ID** to your machine.
60+
1. Click the**Credentials** tab, and copy and paste the**Client secret** to your machine.
61+
1. From the sidebar, select**Realm Settings**, and copy and paste the**Realm ID**.
62+
You will need the Client ID, Client Secret, and Realm ID to configure SSO for Keycloak in Codefresh.
63+
1. Continue with[Step 2: Configure SSO settings for Keycloak in Codefresh](#step-2-configure-sso-settings-for-keycloak-in-codefresh).
64+
65+
##Step 2: Configure SSO settings for Keycloak in Codefresh
66+
<br>
67+
68+
**Before you begin**
69+
* Make sure you have:
70+
* The**Client ID**,**Client Secret**, and**Realm ID** from Keycloak in Step 1
71+
72+
**How to**
73+
74+
1. In the Codefresh UI, from the toolbar click the**Settings** icon.
75+
1. In the sidebar, from Access & Collaboration, select[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
76+
1. Click**+ Add Single Sign-On**, select**Keycloak**, and then click**Next**.
77+
1. Enter the following:
78+
***Client Name**: For auto-generation, leave empty. Codefresh generates the client name once you save the settings.
79+
***Display Name**: Meaningful name that identifies the integration with this SSO provider.
80+
***Client ID**: The Client ID for Codefresh you copied from Keycloak.
81+
***Client Secret**: The Client Secret for Codefresh you also copied from Keycloak.
82+
***Host**: The Keycloak URL.
83+
***Realm**: Optional. The Realm ID for Codefresh you copied from Keycloak.
84+
85+
{% include image.html
86+
lightbox="true"
87+
file="/images/sso/keycloak/sso-keycloak-settings-codefresh.png"
88+
url="/images/sso/keycloak/sso-keycloak-settings-codefresh.png"
89+
alt="SSO settings for Keycloak in Codefresh"
90+
caption="SSO settings for Keycloak in Codefresh"
91+
max-width="40%"
92+
%}
93+
94+
{:start="5"}
95+
1. Click**Add**. Codefresh creates Keycloak as an identity provider, with the auto-generated Client Name.
96+
97+
{% include image.html
98+
lightbox="true"
99+
file="/images/sso/keycloak/keycloak-auto-generated-client-name.png"
100+
url="/images/sso/keycloak/keycloak-auto-generated-client-name.png"
101+
alt="Getting the auto-generated Client Name"
102+
caption="Getting the auto-generated Client Name"
103+
max-width="90%"
104+
%}
105+
106+
{:start="6"}
107+
1. Note down the Client Name, as you need it to set the redirect URI in Keycloak.
108+
1. Continue with[Step 3: Set up Redirect URI in Keycloak](#step-3-set-up-redirect-uri-in-keycloak).
109+
110+
##Step 3: Set up Redirect URI in Keycloak
111+
1. Log in again to Keycloak.
112+
1. From the sidebar, select**Clients** and then select**Codefresh** from the Clients List.
113+
1. Click the**Settings** tab, and then define the**Access Settings**:
114+
1. In the**Root URL** and**Home URL** fields, enter`https://g.codefresh.io`.
115+
1. In the**Valid redirect URIs** field, enter`https://g.codefresh.io/api/auth/<your_codefresh_client_name>/callback`
116+
where:`<your_codefresh_client_name>` is the Client Name auto-generated by Codefresh, for example,`https://g.codefresh.io/api/auth/ruUtQOzX4T0D/callback`.
117+
118+
1. Click**Save**.
119+
120+
121+
You have now completed SSO setup for Keycloak via OIDC.
122+
123+
##Sync teams via CLI
124+
Sync users and teams through the[CLI]({{site.baseurl}}/docs/single-sign-on/team-sync/#cli-synchronize-teams).
125+
126+
##Related articles
127+
[Federated Single Sign-On (SSO) overview]({{site.baseurl}}/docs/single-sign-on/single-sign-on/)
128+
[Setting up OIDC Federated SSO]({{site.baseurl}}/docs/single-sign-on/oidc)
129+
[Common configuration for SSO providers]({{site.baseurl}}/docs/single-sign-on/team-sync)

‎_docs/single-sign-on/team-sync.md‎

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,6 @@ You can sync teams:
1818
* Automatically, in the Codefresh UI when you set up the SSO account for the IdP, through the**Auto-sync team** option. For details, see the SSO setup for your IdP.
1919
* Manually, through the Codefresh CLI's[synchronize teams command](https://codefresh-io.github.io/cli/teams/synchronize-teams/){:target="\_blank"}.
2020

21-
>Team-sync is supported for OIDC providers.
22-
For SAML, team-sync is supported only for Google.
2321

2422
##CLI synchronize teams
2523

65.5 KB
Loading
47.7 KB
Loading
61.1 KB
Loading
97.7 KB
Loading
65.9 KB
Loading
88.8 KB
Loading

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp