From b842f14d4b8f2714568d5e9ae59ab96924b5ddbe Mon Sep 17 00:00:00 2001 From: Karim Gillani Date: Fri, 1 Feb 2019 08:57:18 -0800 Subject: [PATCH] Updated Keycloak OIDC Integration (markdown) --- Keycloak---OIDC-Integration.md | 62 +++++++++++++++++----------------- 1 file changed, 31 insertions(+), 31 deletions(-) diff --git a/Keycloak---OIDC-Integration.md b/Keycloak---OIDC-Integration.md index d98f6d2..6d00415 100644 --- a/Keycloak---OIDC-Integration.md +++ b/Keycloak---OIDC-Integration.md @@ -2,42 +2,42 @@ Outstanding Bug: When the user is registered, in the users entry in the mongo da Environment Variables that need to be set in your Wekan container: -OAUTH2_ENABLE = TRUE -OAUTH2_CLIENT_ID = -OAUTH2_SERVER_URL = /auth -OAUTH2_AUTH_ENDPOINT = /realms//protocol/openid-connect/auth -OAUTH2_USERINFO_ENDPOINT = /realms//protocol/openid-connect/userinfo -OAUTH2_TOKEN_ENDPOINT = /realms//protocol/openid-connect/token -OAUTH2_SECRET = -** When creating a Client in keycloak, ensure the access type is confidential under the settings tab. After clicking save, you will have a Credentials tab. You can retrieve the secret from that location. +* OAUTH2_ENABLE = TRUE +* OAUTH2_CLIENT_ID = +* OAUTH2_SERVER_URL = /auth +* OAUTH2_AUTH_ENDPOINT = /realms//protocol/openid-connect/auth +* OAUTH2_USERINFO_ENDPOINT = /realms//protocol/openid-connect/userinfo +* OAUTH2_TOKEN_ENDPOINT = /realms//protocol/openid-connect/token +* OAUTH2_SECRET = +> When creating a Client in keycloak, ensure the access type is confidential under the settings tab. After clicking save, you will have a Credentials tab. You can retrieve the secret from that location. Under the Client area in Keycloak, click on the Mappers area and "create" the following: -1. displayName -Name: displayName -Consent Required: Off -Mapper Type: User Attribute -User Attribute: displayName -Token Claim Name: displayName -Claim JSON Type: String -Add to ID token: on -Add to access token : on -Add to userinfo : on -Multivalued: off +1. displayName +* Name: displayName +* Consent Required: Off +* Mapper Type: User Attribute +* User Attribute: displayName +* Token Claim Name: displayName +* Claim JSON Type: String +* Add to ID token: on +* Add to access token : on +* Add to userinfo : on +* Multivalued: off -2. id -Name: id -Consent Required: Off -Mapper Type: User Property -User Attribute: username -Token Claim Name: id -Claim JSON Type: String -Add to ID token: on -Add to access token : on -Add to userinfo : on +2. id +* Name: id +* Consent Required: Off +* Mapper Type: User Property +* User Attribute: username +* Token Claim Name: id +* Claim JSON Type: String +* Add to ID token: on +* Add to access token : on +* Add to userinfo : on -Edit the existing username mapper: -Token Claim Name: uid +Edit the existing username mapper: +* Token Claim Name: uid