Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Keycloak Reborn? #1341

Open
h3mmy opened this issue Aug 5, 2022 · 8 comments
Open

Keycloak Reborn? #1341

h3mmy opened this issue Aug 5, 2022 · 8 comments
Assignees
Labels
area/cluster Changes made in the cluster directory area/terraform Changes made in the terraform directory blocked blocked by another issue documentation Improvements or additions to documentation enhancement New feature or request

Comments

@h3mmy
Copy link
Owner

h3mmy commented Aug 5, 2022

Details

Describe the solution you'd like:

Keycloak is something I miss. It's very versatile and is able to do various things declaratively that I have been unable to accomplish with authentik.

Keycloak is going to be way way easier to setup and configure as they shift to the quarkus framework. See Keycloak Operator Guides

Anything else you would like to add:

Other Auth providers to consider:

Additional Information:

@h3mmy h3mmy added the enhancement New feature or request label Aug 5, 2022
h3mmy added a commit that referenced this issue Feb 11, 2023
h3mmy added a commit that referenced this issue Mar 5, 2023
h3mmy added a commit that referenced this issue Mar 5, 2023
@h3mmy
Copy link
Owner Author

h3mmy commented Mar 5, 2023

Todo remaining for canary realm

  • Provision CNPG cluster via CRD (including backups)
  • Consider use-case for redis vs default memcached
  • Create Realm CRD

h3mmy added a commit that referenced this issue Mar 17, 2023
h3mmy added a commit that referenced this issue Mar 19, 2023
h3mmy added a commit that referenced this issue Apr 29, 2023
@h3mmy
Copy link
Owner Author

h3mmy commented May 24, 2023

Next major step is some cert management for signing certificates (PKI). May end up lingering until I re-do the vault TF

@h3mmy
Copy link
Owner Author

h3mmy commented Jul 25, 2023

Another contender: https://github.com/lldap/lldap

@h3mmy h3mmy self-assigned this Jul 25, 2023
@h3mmy h3mmy added documentation Improvements or additions to documentation area/cluster Changes made in the cluster directory area/terraform Changes made in the terraform directory labels Jul 25, 2023
@h3mmy
Copy link
Owner Author

h3mmy commented Jul 25, 2023

Progress Check-in.
Keycloak (Quarkus) is deployed to the cluster. Teardown and Restore work as expected. Backups are made. Backup restoration works as expected. Grafana dashboards aren't fully in place yet but that's not part of this issue.

Remaining items:
[] Implement LDAP backend
[] Define User Model declaratively (experimental)
[] Expose metrics for Prometheus

h3mmy added a commit that referenced this issue Jul 26, 2023
h3mmy added a commit that referenced this issue Jul 26, 2023
h3mmy added a commit that referenced this issue Jul 26, 2023
h3mmy added a commit that referenced this issue Jul 26, 2023
h3mmy added a commit that referenced this issue Jul 26, 2023
h3mmy added a commit that referenced this issue Jul 27, 2023
h3mmy added a commit that referenced this issue Jul 27, 2023
h3mmy added a commit that referenced this issue Jul 27, 2023
h3mmy added a commit that referenced this issue Jul 27, 2023
h3mmy added a commit that referenced this issue Jul 27, 2023
h3mmy added a commit that referenced this issue Jul 27, 2023
h3mmy added a commit that referenced this issue Jul 27, 2023
@h3mmy
Copy link
Owner Author

h3mmy commented Aug 3, 2023

Nixing lldap. Did not allow user creation via keycloak

h3mmy added a commit that referenced this issue Aug 6, 2023
h3mmy added a commit that referenced this issue Aug 6, 2023
h3mmy added a commit that referenced this issue Aug 6, 2023
h3mmy added a commit that referenced this issue Aug 12, 2023
@h3mmy
Copy link
Owner Author

h3mmy commented Aug 16, 2023

Looping lldap back in because of lldap/lldap#301

Basically if that is done, it will fill my use-case and I won't have to go over-engineer a freeIPA instance to get simple federation.

@h3mmy
Copy link
Owner Author

h3mmy commented Aug 16, 2023

Remaining tasks:
[] 2-way ldap federation
[] Shifting userbase from authentik into keycloak transparently to users (not part of this issue)

My testing for solutions to the grafana-operator migration (#4108) and emqx refactor (#2769) kind of tie in significantly here as keycloak will be the auth controller. I feel it would probably be a good idea to prioritize #4775 since that should provide a framework for identity management

h3mmy added a commit that referenced this issue Oct 14, 2023
@h3mmy
Copy link
Owner Author

h3mmy commented Feb 17, 2024

https://www.keycloak.org/operator/customizing-keycloak For theming, will need to build a custom image and have build time params there instead of the keycloak instance >_<

So to have a theme:

  • new dockerfile
  • where to build? the params and secrets are in-cluster. Do I need to externalize them? Does something need to watch for changes and trigger a re-build if a password is rotated? That's a silly amount of overhead to have a logo
  • pipeline to build/rebuild when params like db password changes
  • redo secret management for the special-case. It is pretty annoying to have the one special exception for single apps that want to do things a particular way only.

This is confirmed in keycloak/keycloak#19772

@h3mmy h3mmy added the blocked blocked by another issue label Feb 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/cluster Changes made in the cluster directory area/terraform Changes made in the terraform directory blocked blocked by another issue documentation Improvements or additions to documentation enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant