Skip to content

Commit

Permalink
Add authorization services
Browse files Browse the repository at this point in the history
  • Loading branch information
aolle committed Apr 24, 2024
1 parent fa7f755 commit cb7bef9
Show file tree
Hide file tree
Showing 23 changed files with 97 additions and 5 deletions.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
16 changes: 11 additions & 5 deletions documentation/modules/ROOT/nav.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,14 @@
*** xref:setup.adoc#deploy-operator[1.2.1 Deploying Red Hat build of Keycloak on OpenShift using the Operator]
//*** xref:setup.adoc#deploy-templates[1.2.2 Deploying Red Hat build of Keycloak on OpenShift with GitOps ]
** xref:setup.adoc#deploy-ipa[1.3 Deploying an Identity Management (IdM/FreeIPA) on Red Hat OpenShift]
* xref:openid-jwt.adoc[2. OpenID Connect + JWT]
** xref:openid-jwt.adoc#architecture[2.1. Architecture]
** xref:openid-jwt.adoc#rhbk[2.2. RedHat Build of Keycloak Configuration]
** xref:openid-jwt.adoc#backend[2.3. Backend]
** xref:openid-jwt.adoc#frontend[2.4. Frontend]
* xref:secapp.adoc[2. Authorization Services]
* xref:secapp.adoc#presetup[2.1 Configuration]
* xref:secapp.adoc#quarkus-apps[2.2 Securing Web Applications]
* xref:openid-jwt.adoc[3. OpenID Connect + JWT]
** xref:openid-jwt.adoc#architecture[3.1. Architecture]
** xref:openid-jwt.adoc#rhbk[3.2. Configuration]
** xref:openid-jwt.adoc#backend[3.3. Backend]
** xref:openid-jwt.adoc#frontend[3.4. Frontend]
86 changes: 86 additions & 0 deletions documentation/modules/ROOT/pages/secapp.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,86 @@
= Authorization Services
include::_attributes.adoc[]

[#presetup]
== Configuration

Before proceeding with the next sections, we need to configure the realm, roles and users in our Red Hat build of Keycloak instance.

* Open a browser window and log in to the Red Hat build of Keycloak administration web console.
* Create the `demo` realm. Click on the `master` realm dropdown menu, click `Create Realm`.
image::authservices/create-realm.png[]

* Click `Create`.
image::authservices/create-realm2.png[]

* Create the `staff` group. Click on `Groups`.
image::authservices/groups.png[]

* Then click `Create group`.
image::authservices/groups2.png[]

* Set `staff` as the group name, and click `Create`.
image::authservices/groups3.png[]

* Create the child group named `Personal staff`. Click on the kebab button of the `staff` group and click `Create child group`.
image::authservices/groups4.png[]

* Set `Personal staff` as the name, and click `Create`.
image::authservices/groups5.png[]

* Create the role `vet`. Click on `Realm roles`, then `Create role`.
image::authservices/roles.png[]

image::authservices/roles2.png[]

* Set the Role name, and click `Save`.
image::authservices/roles3.png[]

* Repeat the same steps for creating a role named `assistant`.
image::authservices/roles4.png[]

* Create the user `angel`. Click on `Users`, then `Add user`.
image::authservices/users.png[]

image::authservices/users2.png[]

* Set the username, and click `Create`.
image::authservices/users3.png[]

* Open the `Credentials` tab and set the password for the user. Make sure to set `Temporary` to `OFF` before setting the password.
image::authservices/users4.png[]

image::authservices/users5.png[]

* Open the `Role Mappings` tab and assign the `vet` role to the user.
image::authservices/users6.png[]

image::authservices/users7.png[]

* Open the `Groups` tab and assign the user `angel` to the `Personal staff` group.
image::authservices/users8.png[]

image::authservices/users9.png[]

image::authservices/users10.png[]

* Repeat the same steps for creating a user named `elisabeth` but assign the `assistant` role. Also, remember to incude the user in the `Personal staff` group.
[#quarkus-apps]
== Securing Web Applications

0 comments on commit cb7bef9

Please sign in to comment.