Skip to content

Latest commit

 

History

History
34 lines (21 loc) · 1.87 KB

keycloak.md

File metadata and controls

34 lines (21 loc) · 1.87 KB

User Management with Keycloak

Keycloak is an open source tool that helps for user authentication and authorization. It can act as a Single-Sign On solution and also provides user federation from other identity provider.

Keycloak

Annotto is protected by OAuth using Keycloak. When you start annotto in production mode with docker or in development mode with docker-compose, some users will automatically be created. docker-compose.yml

Once the service is started, you can manage your Keycloak instance at your will. Thanks for those files that are imported directly at keycloak startup

  1. Realm
  2. Users

Keycloak Administration Console

If you want to reach Keycloak Admin Console, you can go to http://localhost:8080 with credentials

user pwd
admin admin

SSO Microsoft

If you want to use Annotto with an SSO such as Microsoft, you can configure keycloak to leverage this Identity Provider. A good documentation to help doing this can be found here

Once you have your Microsoft Identity Provider setup, you will also need to define a way to map your claims and roles from Microsoft to Annotto. You can do so by using a Mapper. Here is an example of how you set an annotto user role to your incoming Microsoft user. User Mapping

Typically, in this example, we set the role user at first login with Microsoft SSO. So the user is created based on the Microsoft profile and the role user is added to this new user in Keycloak.