2021-12-22 09:05:48 +00:00
keycloak_realm
==============
2022-03-23 11:30:32 +00:00
Create realms and clients in [keycloak ](https://keycloak.org/ ) or [Red Hat Single Sign-On ](https://access.redhat.com/products/red-hat-single-sign-on ) services.
2021-12-22 09:05:48 +00:00
Role Defaults
-------------
| Variable | Description | Default |
|:---------|:------------|:---------|
2022-02-15 09:14:44 +00:00
|`keycloak_admin_user`| Administration console user account | `admin` |
|`keycloak_host`| hostname | `localhost` |
|`keycloak_http_port`| HTTP port | `8080` |
|`keycloak_https_port`| TLS HTTP port | `8443` |
|`keycloak_auth_realm`| Name of the main authentication realm | `master` |
|`keycloak_rhsso_enable`| Define service is an upstream(Keycloak) or RHSSO | `master` |
|`keycloak_management_http_port`| Management port | `9990` |
|`keycloak_auth_client`| Authentication client for configuration REST calls | `admin-cli` |
|`keycloak_client_public`| Configure a public realm client | `True` |
|`keycloak_client_web_origins`| Web origins for realm client | `+` |
|`keycloak_url`| URL for configuration rest calls | `http://{{ keycloak_host }}:{{ keycloak_http_port }}` |
|`keycloak_management_url`| URL for management console rest calls | `http://{{ keycloak_host }}:{{ keycloak_management_http_port }}` |
2021-12-22 13:02:13 +00:00
2021-12-22 09:05:48 +00:00
Role Variables
--------------
The following are a set of _required_ variables for the role:
| Variable | Description |
|:---------|:------------|
|`keycloak_admin_password`| Password for the administration console user account |
2021-12-22 13:02:13 +00:00
|`keycloak_realm` | Name of the realm to be created |
2021-12-22 09:05:48 +00:00
2021-12-22 13:02:13 +00:00
The following variables are available for creating clients:
2021-12-22 09:05:48 +00:00
| Variable | Description | Default |
|:---------|:------------|:---------|
2021-12-22 13:02:13 +00:00
|`keycloak_clients` | List of _client_ declarations for the realm | `[]` |
|`keycloak_client_default_roles` | List of default role name for clients | `[]` |
|`keycloak_client_users` | List of user/role mappings for a client | `[]` |
2022-02-09 10:19:49 +00:00
2022-01-17 21:53:16 +00:00
The following variable are available for creating user federation:
| Variable | Description | Default |
|:---------|:------------|:---------|
|`keycloak_user_federation` | List of _keycloak_user_federation_ for the realm | `[]` |
2021-12-22 09:05:48 +00:00
2021-12-22 13:02:13 +00:00
Variable formats
----------------
2022-01-17 21:53:16 +00:00
* `keycloak_user_federation` , a list of:
```yaml
- realm: < name of the realm in which user federation should be configured , required >
name: < name of the user federation provider , required >
2022-02-09 10:19:49 +00:00
provider_id: < type of the user federation provider , required >
provider_type: < Provider Type , default is set to org . keycloak . storage . UserStorageProvider >
config: < dictionary of supported configuration values , required >
mappers: < list of supported configuration values , required >
2022-01-17 21:53:16 +00:00
```
Refer to [docs ](https://docs.ansible.com/ansible/latest/collections/community/general/keycloak_user_federation_module.html ) for information on supported variables.
2022-02-09 10:19:49 +00:00
2021-12-22 13:02:13 +00:00
* `keycloak_clients` , a list of:
```yaml
- name: < name of the client >
roles: < keycloak_client_default_roles >
realm: < name of the realm that contains the client >
public_client: < true for public , false for confidential >
web_origins: < list of allowed we origins for the client >
users: < keycloak_client_users >
```
* `keycloak_client_users` , a list of:
```yaml
- username: < username , required >
password: < password , required >
firstName: < firstName , optional >
lastName: < lastName , optional >
email: < email , optional >
client_roles: < list of client user / role mappings >
```
* Client user/role mappings, a list of:
```yaml
- client: < name of the client >
role: < name of the role >
realm: < name of the realm >
```
2022-02-09 10:19:49 +00:00
For a comprehensive example, refer to the [playbook ](../../playbooks/keycloak_realm.yml ).
2021-12-22 09:05:48 +00:00
Example Playbook
----------------
2021-12-22 13:02:13 +00:00
The following is an example playbook that makes use of the role to create a realm in keycloak.
2021-12-22 09:05:48 +00:00
```yaml
---
- hosts: ...
collections:
- middleware_automation.keycloak
tasks:
- name: Include keycloak role
include_role:
name: keycloak_realm
vars:
keycloak_admin_password: "changeme"
2021-12-22 13:02:13 +00:00
keycloak_realm: TestRealm
keycloak_clients: [...]
2021-12-22 09:05:48 +00:00
```
2021-12-22 13:02:13 +00:00
2021-12-22 09:05:48 +00:00
License
-------
Apache License 2.0
Author Information
------------------
* [Guido Grazioli ](https://github.com/guidograzioli )
* [Romain Pelisse ](https://github.com/rpelisse )