Installation scripts for SURF ResearchCloud catalog components
View the Project on GitHub UtrechtUniversity/researchcloud-items
Installs keycloak as an identity and access management service. NB: Configuration suitable for test/training purposes only.
Ubuntu operating system with desktop environment, and a workspace including the SURF Nginx component.
Keycloak is an open source identity and access management service. It can act as a SAML or OIDC authentication/authorization service. The playbook installs Keycloak for development, testing and training purposes. Note that some addtional hardening and configuration will be needed to use Keycloak in production environments.
Client applications and users access Keycloak services via
https://<hostname>/auth/realms/<realm>/
.
Requests are forwarded by nginx (reverse proxy) to an
application server running Keycloak.
Keycloak admins are required to login to the Linux server on https://<hostname>/
where they access Keycloak via the desktop menu.
Nginx fronts Keycloak as a reverse proxy and offloads ssl. As a consequence, Keycloak will report its realm endpoints as having ‘http’ scheme instead of ‘https’. To compensate for the proxy, use the Keycloak admin console to set an alternative frontend url for each realm that you have added to the system:
Alternative frontend url: https://<hostname>/auth
NB: Do NOT update the master realm settings!!
Role keycloak.
2021 Written by Ton Smeele (Utrecht University)