Skip to content

Instantly share code, notes, and snippets.

View pedroigor's full-sized avatar

Pedro Igor pedroigor

  • Red Hat
  • Brasilia, Brazil
View GitHub Profile
## Goals
- 61
- Wrap up M2
- Authorization Schema Updated with User and Client Resource Types
- Manage and Evaluate
- CRUD User Resource Type in the Administration Console
- Complete Design of the Evaluation Section
- Open discussion in the community about FGAP v2
@pedroigor
pedroigor / gist:1485c333ca3be0f1ce1353167c3d1f9d
Last active October 14, 2024 20:23
Discussion with Stan about FGA and the authorization model
- Create Permission UI
# Permissions to manage all users in a realm
* Resource Type: Users <required>
* Scope: update | read | delete | create
* Allow Users: <select a group> | <select role> | <select whatever we think makes sense as a access control mechanism> <mandatory>
# Permissions to manage users from a group and manage groups in a realm
* Resource Type: Group <required>
* Resource: <groupid> <optional>

Authenticating Organization Members

The Keycloak Organizations feature introduce changes on how users authenticate to a realm in order to identify whether a user is authenticating in the scope of an organization or the realm.

One of the key changes introduced by the feature in terms of authentication is the introduction of an identity-fist login flow whenever you are authenticating to a realm that has the feature enabled.

In this playbook you will learn about:

@pedroigor
pedroigor / onboarding-members-identity-provider.adoc
Last active May 14, 2024 19:25
Onboarding Organization Members through an Identity Provider

Onboarding Organization Members through an Identity Provider

In this playbook you are going to follow the basic steps to configure a Keycloak instance to support a common Business-to-Business (B2B) use case where a company wants to integrate with its business partners to allow their employees or customers to access its services.

For that, users from a business partner are going to be able to create their accounts at the company’s realm by authenticating with their accounts at the business partner and automatically become a member of an organization at the realm that represents the business partner itself.

While the same use case is already possible without using Keycloak Organizations, the feature provides built-in capabilities that makes a lot easier to solve this problem such as:

  • Manage third-parties entities in a realm as an organization

  • Link any of the built-in identity providers to an organization in order to authenticate and onboard its members

@pedroigor
pedroigor / keycloakx-k8s.yaml
Last active August 5, 2022 14:00
Keycloak.X k8s spec
apiVersion: v1
kind: Service
metadata:
name: keycloak-postgres
labels:
service: keycloak
layer: security
spec:
ports:
- port: 5432

Keycloak Admin CLI Cheat Sheet

This document provides some examples about how to use kcadm to manage a realm's configuration.

Configuring Token Exchange Permission for a Client

Enable permissions to a client

./kcadm.sh update clients/{client_id}/management/permissions -f - << EOF