Skip to content

Commit 7634a03

Browse files
committed
Remove Keycloak roles/managed_groups config
It's too complicated, as it requires corresponding Keycloak configuration
1 parent 387bffa commit 7634a03

File tree

1 file changed

+3
-21
lines changed

1 file changed

+3
-21
lines changed

docs/source/administrator/authentication.md

Lines changed: 3 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -425,7 +425,7 @@ documentation in this project also.
425425
[KeyCloak](https://www.keycloak.org) is an open source based provider of
426426
identity management that you can host yourself. Below is an example on how you
427427
can configure the GenericOAuthenticator class to authenticate against a KeyCloak
428-
server (last tested with Keycloak 26).
428+
server (version 17 or later).
429429

430430
To configure an OpenID Connect client, see [KeyCloak's own
431431
documentation](https://www.keycloak.org/docs/latest/server_admin/index.html#_oidc_clients).
@@ -444,32 +444,14 @@ hub:
444444
username_claim: preferred_username
445445
userdata_params:
446446
state: state
447-
allowed_users:
448-
- user
447+
# Allow all Keycloak users
448+
allow_all: true
449449
admin_users:
450450
- admin
451451
JupyterHub:
452452
authenticator_class: generic-oauth
453453
```
454454

455-
If you want to use Keycloak roles as JupyterHub groups for authorization you must create or modify a Keycloak scope mapper to return the roles, and ensure the mapper is returned in userinfo.
456-
For example, if you modify the default Keycloak Client scope called `roles`:
457-
458-
```yaml
459-
hub:
460-
config:
461-
GenericOAuthenticator:
462-
scope:
463-
- openid
464-
- roles
465-
auth_state_groups_key: oauth_user.realm_access.roles
466-
manage_groups: true
467-
allowed_groups:
468-
- user
469-
admin_groups:
470-
- admin
471-
```
472-
473455
### LDAP and Active Directory
474456

475457
```{warning}

0 commit comments

Comments
 (0)