2021-12-14 08:54:49 +00:00
# Ansible Collection - keycloak
[![Build Status ](https://github.com/ansible-middleware/keycloak/workflows/CI/badge.svg?branch=main )](https://github.com/ansible-middleware/keycloak/actions/workflows/ci.yml)
Collection to install and configure [Keycloak ](https://www.keycloak.org/ ) or [Red Hat Single Sign-On ](https://access.redhat.com/products/red-hat-single-sign-on ).
<!-- start requires_ansible -->
## Ansible version compatibility
This collection has been tested against following Ansible versions: ** >=2.9.10**.
Plugins and modules within a collection may be tested with only specific Ansible versions. A collection may contain metadata that identifies these versions.
<!-- end requires_ansible -->
2022-01-07 02:24:04 +00:00
## Installation
2021-12-14 08:54:49 +00:00
### Installing the Collection from Ansible Galaxy
Before using the collection, you need to install it with the Ansible Galaxy CLI:
ansible-galaxy collection install middleware_automation.keycloak
You can also include it in a `requirements.yml` file and install it via `ansible-galaxy collection install -r requirements.yml` , using the format:
```yaml
---
collections:
- name: middleware_automation.keycloak
```
2022-01-27 10:59:35 +00:00
The keycloak collection also depends on the following python packages to be present on the controller host:
* netaddr
A requirement file is provided to install:
pip install -r requirements.txt
### Included roles
* [`keycloak` ](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md ): role for installing the service.
* [`keycloak_realm` ](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md ): role for configuring a realm, user federation(s), clients and users, in an installed service.
## Usage
2022-01-07 02:24:04 +00:00
### Install Playbook
2022-01-14 19:54:10 +00:00
`playbooks/keycloak.yml` installs the upstream(Keycloak) based on the defined variables.
`playbooks/rhsso.yml` installs Red Hat Single Sign-On(RHSSO) based on defined variables.
2022-01-07 02:24:04 +00:00
2022-01-14 19:54:10 +00:00
### Choosing between upstream(Keycloak) project and Red Hat Single Sign-On(RHSSO)
2021-12-14 15:47:36 +00:00
2022-01-14 19:54:10 +00:00
The roles supports installing upstream(Keycloak) or Red Hat Single Sign-On in the following ways
2022-01-11 07:34:06 +00:00
2022-01-14 19:54:10 +00:00
#### Install upstream(Keycloak) from remote source
2022-01-11 07:34:06 +00:00
2022-01-14 19:54:10 +00:00
This is default approach, there is one required variable
2022-01-11 07:34:06 +00:00
2022-01-14 19:54:10 +00:00
```
keycloak_admin_password: "< changeme > "
```
#### Install upstream(Keycloak) from local source when the following variable is defined
2022-01-11 07:34:06 +00:00
```
2022-01-14 19:54:10 +00:00
keycloak_admin_password: "< changeme > "
zip_file_local_path: < keycloak zip file on Ansible control node local path >
2022-01-11 07:34:06 +00:00
```
2022-01-14 19:54:10 +00:00
#### Install RHSSO from the Red Hat Customer Support Portal, when the following variables are defined
2021-12-14 15:47:36 +00:00
```
2022-01-14 19:54:10 +00:00
keycloak_admin_password: "< changeme > "
2021-12-14 15:47:36 +00:00
rhn_username: '< customer_portal_username > '
rhn_password: '< customer_portal_password > '
rhsso_rhn_id: '< sso_product_id > '
```
where `sso_product_id` is the ID for the specific Red Hat Single Sign-On version, ie. _101971_ will install version _7.5_ )
2022-01-12 15:13:53 +00:00
#### Install RHSSO from remote sources like Nexus etc, when the following variables are defined
```
2022-01-14 19:54:10 +00:00
keycloak_admin_password: "< changeme > "
keycloak_rhsso_enable: True
rhsso_source_download_url: '< url to download RHSSO zip file > '
2022-01-12 15:13:53 +00:00
```
2022-01-11 07:34:06 +00:00
#### Install RHSSO from local source when the following variable is defined
```
2022-01-14 19:54:10 +00:00
keycloak_admin_password: "< changeme > "
keycloak_rhsso_enable: True
zip_file_local_path: < rhsso zip file on Ansible control node local path >
2022-01-11 07:34:06 +00:00
```
2022-01-07 02:24:04 +00:00
### Example installation command
Execute the following command from the source root directory
```
2022-01-07 16:09:25 +00:00
ansible-playbook -i < ansible_hosts > -e @rhn -creds.yml playbooks/keycloak.yml -e keycloak_admin_password=< changeme >
2022-01-07 02:24:04 +00:00
```
2022-01-07 16:09:25 +00:00
- `keycloak_admin_password` Password for the administration console user account.
- `ansible_hosts` is the inventory, below is an example inventory for deploying to localhost
```
[keycloak]
localhost ansible_connection=local
```
2022-01-07 02:24:04 +00:00
## Configuration
### Config Playbook
2022-01-17 21:53:16 +00:00
`playbooks/keycloak-realm.yml` creates provided realm, user federation(s), client(s), client role(s) and client user(s) if they don't exist.
2022-01-07 02:24:04 +00:00
### Example configuration command
Execute the following command from the source root directory
```
2022-01-17 21:53:16 +00:00
ansible-playbook -i < ansible_hosts > playbooks/keycloak-realm.yml -e keycloak_admin_password=< changeme > -e keycloak_realm=test
2022-01-07 02:24:04 +00:00
```
2021-12-22 13:02:13 +00:00
2022-01-07 16:09:25 +00:00
- `keycloak_admin_password` password for the administration console user account.
- `keycloak_realm` name of the realm to be created/used.
- `ansible_hosts` is the inventory, below is an example inventory for deploying to localhost
```
[keycloak]
localhost ansible_connection=local
```
2021-12-14 08:54:49 +00:00
## License
Apache License v2.0 or later
2022-01-27 10:59:35 +00:00
See [LICENSE ](LICENSE ) to view the full text.
2021-12-14 08:54:49 +00:00