Skip to main content

Authentication

Key features

Providers

Keycloak

See Get started with Keycloak on Kubernetes started and Configure Keycloak (OIDC)

  • Open the Keycloak admin console

    • Create a Realm

    A realm in Keycloak is the equivalent of a tenant. It allows creating isolated groups of applications and users. By default there is a single realm in Keycloak called master. This is dedicated to manage Keycloak and should not be used for your own applications.

    • Create a User and set Credentials (password)

      • (Optional) Validate login on Account Console with the newly created User (https://mydomain/realms/demo/account/#/)
    • Create a Client

      • Add Client, Client ID to "rancher", Client Protocol to "openid-connect"
      • In Client details > Settings, set Base URL to https://rancherurl/, Valid Redirect URIs to https://rancherurl/verify-auth, Access Type to confidential, activate Authorization Enabled and click on Save (so Credentials tab can be displayed)
      • In Client details > Mappers, create the 3 Mappers (Groups Mapper, Client Audience, Group Path)
      • In Client details > Credentials, copy client secret
    • Realm Settings > General tab, click OpenID Endpoint Configuration and copy from the JSON output will display values for issuer and authorization_endpoint

    {
    "issuer":"https://keycloak.mydomain/realms/demo",
    "authorization_endpoint":"https://keycloak.mydomain/realms/demo/protocol/openid-connect/auth"
    // ...
    }
  • Open Rancher

    • Configure a Keycloak OIDC account form, change Endpoints to Specify (advanced) and override the Issuer and Auth Endpoint values

Integrations

NeuVector