This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
сервис_keycloak [2025/05/13 16:34] val [Kubernetes] |
сервис_keycloak [2025/10/10 11:42] (current) val [Аутентификация пользователей WEB приложения] |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Сервис Keycloak ====== | ====== Сервис Keycloak ====== | ||
+ | * [[Практические примеры Keycloak]] | ||
===== Установка и запуск ===== | ===== Установка и запуск ===== | ||
Line 19: | Line 20: | ||
==== docker-compose ==== | ==== docker-compose ==== | ||
+ | |||
+ | * Установка [[Технология Docker#docker-compose]] | ||
* [[https://swjm.blog/deploying-keycloak-with-ssl-in-just-10-minutes-46073e5cf699|Deploying Keycloak with SSL in just 10 minutes!]] | * [[https://swjm.blog/deploying-keycloak-with-ssl-in-just-10-minutes-46073e5cf699|Deploying Keycloak with SSL in just 10 minutes!]] | ||
Line 53: | Line 56: | ||
keycloak: | keycloak: | ||
image: quay.io/keycloak/keycloak:22.0.5 | image: quay.io/keycloak/keycloak:22.0.5 | ||
+ | # image: quay.io/keycloak/keycloak:26.1.3 | ||
container_name: keycloak | container_name: keycloak | ||
restart: always | restart: always | ||
Line 68: | Line 72: | ||
- KEYCLOAK_ADMIN=admin | - KEYCLOAK_ADMIN=admin | ||
- KEYCLOAK_ADMIN_PASSWORD=strongpassword | - KEYCLOAK_ADMIN_PASSWORD=strongpassword | ||
+ | # - KC_BOOTSTRAP_ADMIN_USERNAME=admin | ||
+ | # - KC_BOOTSTRAP_ADMIN_PASSWORD=strongpassword | ||
- KC_HTTPS_CERTIFICATE_FILE=/wild.crt | - KC_HTTPS_CERTIFICATE_FILE=/wild.crt | ||
- KC_HTTPS_CERTIFICATE_KEY_FILE=/wild.key | - KC_HTTPS_CERTIFICATE_KEY_FILE=/wild.key | ||
+ | # - KC_PROXY_HEADERS=xforwarded | ||
# - KC_DB=postgres | # - KC_DB=postgres | ||
# - KC_DB_URL=jdbc:postgresql://postgres:5432/keycloak | # - KC_DB_URL=jdbc:postgresql://postgres:5432/keycloak | ||
Line 93: | Line 100: | ||
# docker logs keycloak -f | # docker logs keycloak -f | ||
+ | |||
+ | # ###docker inspect keycloak -f {{.NetworkSettings.Networks.root_default.IPAddress}} | ||
# ###docker exec -ti postgres_db psql -U keycloak | # ###docker exec -ti postgres_db psql -U keycloak | ||
Line 104: | Line 113: | ||
* [[https://github.com/bitnami/charts/tree/keycloak/17.3.6/bitnami/keycloak]] | * [[https://github.com/bitnami/charts/tree/keycloak/17.3.6/bitnami/keycloak]] | ||
* [[https://github.com/helm/helm/issues/11000|issues: helm search repo chart <oci-repo/oci-chart> --versions for OCI]] | * [[https://github.com/helm/helm/issues/11000|issues: helm search repo chart <oci-repo/oci-chart> --versions for OCI]] | ||
+ | |||
+ | * [[Сервис PostgreSQL]] | ||
+ | * Kubernetes [[Система Kubernetes#secrets tls]] | ||
<code> | <code> | ||
~/$ helm repo add bitnami https://charts.bitnami.com/bitnami; helm search repo bitnami/keycloak --versions; helm repo remove bitnami | ~/$ helm repo add bitnami https://charts.bitnami.com/bitnami; helm search repo bitnami/keycloak --versions; helm repo remove bitnami | ||
+ | |||
+ | ~/$ KC_HC_VER=17.3.6 | ||
+ | ~/$ #KC_HC_VER=25.2.0 | ||
~/$ mkdir keycloak; cd keycloak | ~/$ mkdir keycloak; cd keycloak | ||
- | ~/keycloak$ ###helm pull oci://registry-1.docker.io/bitnamicharts/keycloak --version 17.3.6 | + | ~/keycloak$ ###helm pull oci://registry-1.docker.io/bitnamicharts/keycloak --version $KC_HC_VER |
- | ~/keycloak$ helm template my-keycloak oci://registry-1.docker.io/bitnamicharts/keycloak --version 17.3.6 | tee keycloak.yaml | less | + | ~/keycloak$ helm template my-keycloak oci://registry-1.docker.io/bitnamicharts/keycloak --version $KC_HC_VER | tee keycloak.yaml | less |
/PersistentVolumeClaim | /PersistentVolumeClaim | ||
</code> | </code> | ||
Line 120: | Line 135: | ||
<code> | <code> | ||
- | ~/keycloak$ helm show values oci://registry-1.docker.io/bitnamicharts/keycloak --version 17.3.6 | tee values.yaml.orig | + | ~/keycloak$ helm show values oci://registry-1.docker.io/bitnamicharts/keycloak --version $KC_HC_VER | tee values.yaml.orig |
| | ||
~/keycloak$ cat values.yaml | ~/keycloak$ cat values.yaml | ||
</code><code> | </code><code> | ||
+ | global: | ||
+ | security: | ||
+ | allowInsecureImages: true | ||
+ | image: | ||
+ | repository: bitnamilegacy/keycloak | ||
+ | |||
auth: | auth: | ||
adminUser: admin | adminUser: admin | ||
Line 133: | Line 154: | ||
ingressClassName: nginx | ingressClassName: nginx | ||
hostname: keycloak.corp13.un | hostname: keycloak.corp13.un | ||
+ | # tls: true | ||
+ | # extraTls: | ||
+ | # - hosts: | ||
+ | # - keycloak.corp13.un | ||
+ | # secretName: keycloak-tls | ||
+ | |||
#replicaCount: 2 | #replicaCount: 2 | ||
Line 175: | Line 202: | ||
# name: themes | # name: themes | ||
</code><code> | </code><code> | ||
- | ~/keycloak$ ###helm template my-keycloak -f values.yaml oci://registry-1.docker.io/bitnamicharts/keycloak -n my-keycloak-ns --version 17.3.6 | less | + | ~/keycloak$ ###helm template my-keycloak -f values.yaml oci://registry-1.docker.io/bitnamicharts/keycloak -n my-keycloak-ns --version $KC_HC_VER | less |
- | ~/keycloak$ helm upgrade my-keycloak -i -f values.yaml oci://registry-1.docker.io/bitnamicharts/keycloak -n my-keycloak-ns --create-namespace --version 17.3.6 | + | ~/keycloak$ helm upgrade my-keycloak -i -f values.yaml oci://registry-1.docker.io/bitnamicharts/keycloak -n my-keycloak-ns --version $KC_HC_VER --create-namespace |
~/keycloak$ kubectl -n my-keycloak-ns get pods -o wide --watch | ~/keycloak$ kubectl -n my-keycloak-ns get pods -o wide --watch | ||
Line 226: | Line 253: | ||
Client ID: any-client | Client ID: any-client | ||
Valid redirect URIs: * | Valid redirect URIs: * | ||
+ | | ||
+ | может понадобиться включить | ||
+ | Direct access grants | ||
</code> | </code> | ||
Line 302: | Line 332: | ||
username -> | username -> | ||
LDAP Attribute: sAMAccountName | LDAP Attribute: sAMAccountName | ||
+ | </code> | ||
+ | |||
+ | === FreeIPA === | ||
+ | <code> | ||
+ | Vendor: Other | ||
+ | |||
+ | Connection URL: ldap://server.corpX.un | ||
+ | |||
+ | Bind type: none | ||
+ | или, для выгрузки email | ||
+ | Bind type: simple | ||
+ | Bind DN: uid=admin,cn=users,cn=accounts,dc=corp13,dc=un | ||
+ | |||
+ | Edit mode: READ_ONLY | ||
+ | |||
+ | Users DN: cn=users,cn=compat,dc=corpX,dc=un | ||
+ | Users DN: cn=users,cn=accounts,dc=corpX,dc=un | ||
+ | ... | ||
+ | Username LDAP attribute: uid | ||
+ | ... | ||
+ | RDN LDAP attribute: uid | ||
+ | ... | ||
+ | UUID LDAP attribute: ipaAnchorUUID | ||
+ | UUID LDAP attribute: uid | ||
</code> | </code> | ||
Line 361: | Line 415: | ||
Value: readwrite | Value: readwrite | ||
| | ||
+ | </code> | ||
+ | |||
+ | ===== REST API ===== | ||
+ | |||
+ | * [[https://www.keycloak.org/docs-api/latest/rest-api/index.html]] | ||
+ | * [[https://jwt.io/|JWT.IO allows you to decode, verify and generate JWT]] | ||
+ | * [[https://steve-mu.medium.com/create-new-user-in-keycloak-with-admin-restful-api-e6e868b836b4]] | ||
+ | |||
+ | * [[Утилита jq]] | ||
+ | |||
+ | <code> | ||
+ | $ cat keycloak.sh | ||
+ | </code><code> | ||
+ | KEYCLOAK_URL=https://kc.corp.un | ||
+ | KEYCLOAK_REALM=master | ||
+ | KEYCLOAK_USERNAME=admin | ||
+ | KEYCLOAK_PASSWORD=strongpassword | ||
+ | KEYCLOAK_CLIENT_ID=admin-cli | ||
+ | |||
+ | ACCESS_TOKEN=$(curl -SskX POST "${KEYCLOAK_URL}/realms/${KEYCLOAK_REALM}/protocol/openid-connect/token" \ | ||
+ | -d "username=${KEYCLOAK_USERNAME}" \ | ||
+ | -d "password=${KEYCLOAK_PASSWORD}" \ | ||
+ | -d "grant_type=password" \ | ||
+ | -d "client_id=${KEYCLOAK_CLIENT_ID}" | jq -r '.access_token') | ||
+ | |||
+ | echo $ACCESS_TOKEN | ||
+ | |||
+ | #exit 0 | ||
+ | |||
+ | #USER_ID=6c43d042-2674-4bee-82a5-b31713a15093 | ||
+ | |||
+ | #curl -SskX GET "${KEYCLOAK_URL}/admin/realms/${KEYCLOAK_REALM}/users/" \ | ||
+ | # -H "Authorization: Bearer ${ACCESS_TOKEN}" | jq | ||
+ | #curl -SskX GET "${KEYCLOAK_URL}/admin/realms/${KEYCLOAK_REALM}/users/${USER_ID}" \ | ||
+ | #curl -SskX GET "${KEYCLOAK_URL}/admin/realms/${KEYCLOAK_REALM}/users/?q=username:user1" \ | ||
+ | |||
+ | #curl -SskX POST "${KEYCLOAK_URL}/admin/realms/${KEYCLOAK_REALM}/users/" \ | ||
+ | # -H "Content-Type: application/json" \ | ||
+ | # -H "Authorization: Bearer ${ACCESS_TOKEN}" \ | ||
+ | # -d '{"username": "user1"}' | ||
+ | # --data-binary "@user1.json" | ||
+ | |||
+ | #curl -SskX PUT "${KEYCLOAK_URL}/admin/realms/${KEYCLOAK_REALM}/users/${USER_ID}" \ | ||
+ | # -H "Content-Type: application/json" \ | ||
+ | # -H "Authorization: Bearer ${ACCESS_TOKEN}" \ | ||
+ | # --data-binary "@user1.json" | ||
+ | # -d '{"firstName": "Ivan"}' | ||
+ | |||
+ | #curl -kX PUT "${KEYCLOAK_URL}/admin/realms/${KEYCLOAK_REALM}/users/${USER_ID}/reset-password" \ | ||
+ | # -H "Authorization: Bearer ${ACCESS_TOKEN}" \ | ||
+ | # -H "Content-Type: application/json" \ | ||
+ | # -d '{ "type": "password", "temporary": false, "value": "kcpassword1" }' | ||
+ | |||
+ | #curl -SskX DELETE "${KEYCLOAK_URL}/admin/realms/${KEYCLOAK_REALM}/users/${USER_ID}" \ | ||
+ | # -H "Authorization: Bearer ${ACCESS_TOKEN}" | ||
+ | </code><code> | ||
+ | $ cat user1.json | ||
+ | </code><code> | ||
+ | { | ||
+ | "username": "user1", | ||
+ | "email": "user1@corp.un", | ||
+ | "firstName": "Иван", | ||
+ | "lastName": "Иванов", | ||
+ | "enabled": true, | ||
+ | "emailVerified": true | ||
+ | } | ||
</code> | </code> | ||