mirror of
https://github.com/funkypenguin/geek-cookbook/
synced 2025-12-26 16:11:44 +00:00
Add Traefik Forward Auth against KeyCloak
This commit is contained in:
@@ -63,4 +63,6 @@ We've setup a new realm in KeyCloak, and configured read-write federation to an
|
||||
!!! Summary
|
||||
Created:
|
||||
|
||||
* [X] KeyCloak realm in read-write federation with [OpenLDAP](/recipes/openldap/) directory
|
||||
* [X] KeyCloak realm in read-write federation with [OpenLDAP](/recipes/openldap/) directory
|
||||
|
||||
## Chef's Notes 📓
|
||||
@@ -12,6 +12,7 @@ Unless you plan to authenticate against an outside provider (*[OpenLDAP](/recipe
|
||||
|
||||
* [X] [KeyCloak](/recipes/keycloak/) recipe deployed successfully
|
||||
|
||||
### Create User
|
||||
|
||||
Within the "Master" realm (*no need for more realms yet*), navigate to **Manage** -> **Users**, and then click **Add User** at the top right:
|
||||
|
||||
@@ -21,6 +22,8 @@ Populate your new user's username (it's the only mandatory field)
|
||||
|
||||

|
||||
|
||||
### Set User Credentials
|
||||
|
||||
Once your user is created, to set their password, click on the "**Credentials**" tab, and procede to reset it. Set the password to non-temporary, unless you like extra work!
|
||||
|
||||

|
||||
|
||||
@@ -50,4 +50,6 @@ We've setup an OIDC client in KeyCloak, which we can now use to protect vulnerab
|
||||
!!! Summary
|
||||
Created:
|
||||
|
||||
* [X] Client ID and Client Secret used to authenticate against KeyCloak with OpenID Connect
|
||||
* [X] Client ID and Client Secret used to authenticate against KeyCloak with OpenID Connect
|
||||
|
||||
## Chef's Notes 📓
|
||||
Reference in New Issue
Block a user