Skip to content

Authentication

Key features

Providers

Keycloak

See Get started with Keycloak on Kubernetes started and Configure Keycloak (OIDC)

  • Open the Keycloak admin console

    • Create a Realm

    A realm in Keycloak is the equivalent of a tenant. It allows creating isolated groups of applications and users. By default there is a single realm in Keycloak called master. This is dedicated to manage Keycloak and should not be used for your own applications.

    • Create a User and set Credentials (password)

      • (Optional) Validate login on Account Console with the newly created User ("https://mydomain/realms/demo/account/#/")
    • Create a Client

      • Add Client, Client ID to "rancher", Client Protocol to "openid-connect"
      • In Client details > Settings, set Base URL to "https://rancherurl/", Valid Redirect URIs to "https://rancherurl/verify-auth", Access Type to confidential, activate Authorization Enabled and click on Save (so Credentials tab can be displayed)
      • In Client details > Mappers, create the 3 Mappers (Groups Mapper, Client Audience, Group Path)
      • In Client details > Credentials, copy client secret
    • Realm Settings > General tab, click OpenID Endpoint Configuration and copy from the JSON output will display values for issuer and authorization_endpoint

    {
      "issuer":"https://keycloak.mydomain/realms/demo",
      "authorization_endpoint":"https://keycloak.mydomain/realms/demo/protocol/openid-connect/auth"
      // ...
    }
    
  • Open Rancher

    • Configure a Keycloak OIDC account form, change Endpoints to Specify (advanced) and override the Issuer and Auth Endpoint values

Integrations

NeuVector