keycloak_realm ============== Create realms and clients in [keycloak](https://keycloak.org/) or [Red Hat Single Sing-On](https://access.redhat.com/products/red-hat-single-sign-on) services. Role Defaults ------------- | Variable | Description | Default | |:---------|:------------|:---------| |`keycloak_admin_user` | Administration console user account | `admin` | |`keycloak_host` | hostname | `localhost` | |`keycloak_http_port` | HTTP port | `8080` | |`keycloak_https_port` | TLS HTTP port | `8443` | |`keycloak_auth_realm` | Name of the main authentication realm | `master` | |`keycloak_rhsso_enable` | Define service is an upstream(Keycloak) or RHSSO | `master` | Role Variables -------------- The following are a set of _required_ variables for the role: | Variable | Description | |:---------|:------------| |`keycloak_admin_password`| Password for the administration console user account | |`keycloak_realm` | Name of the realm to be created | The following variables are available for creating clients: | Variable | Description | Default | |:---------|:------------|:---------| |`keycloak_clients` | List of _client_ declarations for the realm | `[]` | |`keycloak_client_default_roles` | List of default role name for clients | `[]` | |`keycloak_client_users` | List of user/role mappings for a client | `[]` | The following variable are available for creating user federation: | Variable | Description | Default | |:---------|:------------|:---------| |`keycloak_user_federation` | List of _keycloak_user_federation_ for the realm | `[]` | Variable formats ---------------- * `keycloak_user_federation`, a list of: ```yaml - realm: name: provider_id: provider_type: < Provider Type, default is set to org.keycloak.storage.UserStorageProvider> config: mappers: ``` Refer to [docs](https://docs.ansible.com/ansible/latest/collections/community/general/keycloak_user_federation_module.html) for information on supported variables. * `keycloak_clients`, a list of: ```yaml - name: roles: realm: public_client: web_origins: users: ``` * `keycloak_client_users`, a list of: ```yaml - username: password: firstName: lastName: email: client_roles: ``` * Client user/role mappings, a list of: ```yaml - client: role: realm: ``` For a comprehensive example, refer to the [playbook](playbooks/keycloak.yml). Example Playbook ---------------- The following is an example playbook that makes use of the role to create a realm in keycloak. ```yaml --- - hosts: ... collections: - middleware_automation.keycloak tasks: - name: Include keycloak role include_role: name: keycloak_realm vars: keycloak_admin_password: "changeme" keycloak_realm: TestRealm keycloak_clients: [...] ``` License ------- Apache License 2.0 Author Information ------------------ * [Guido Grazioli](https://github.com/guidograzioli) * [Romain Pelisse](https://github.com/rpelisse)