-
-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keycloak Reborn? #1341
Comments
Todo remaining for canary realm
|
Next major step is some cert management for signing certificates (PKI). May end up lingering until I re-do the vault TF |
Another contender: https://github.com/lldap/lldap |
Progress Check-in. Remaining items: |
Nixing lldap. Did not allow user creation via keycloak |
Looping lldap back in because of lldap/lldap#301 Basically if that is done, it will fill my use-case and I won't have to go over-engineer a freeIPA instance to get simple federation. |
Remaining tasks: My testing for solutions to the grafana-operator migration (#4108) and emqx refactor (#2769) kind of tie in significantly here as keycloak will be the auth controller. I feel it would probably be a good idea to prioritize #4775 since that should provide a framework for identity management |
https://www.keycloak.org/operator/customizing-keycloak For theming, will need to build a custom image and have build time params there instead of the keycloak instance >_< So to have a theme:
This is confirmed in keycloak/keycloak#19772 |
Details
Describe the solution you'd like:
Keycloak is something I miss. It's very versatile and is able to do various things declaratively that I have been unable to accomplish with authentik.
Keycloak is going to be way way easier to setup and configure as they shift to the quarkus framework. See Keycloak Operator Guides
Anything else you would like to add:
Other Auth providers to consider:
Additional Information:
The text was updated successfully, but these errors were encountered: