Skip to content

Commit 9b2c1a6

Browse files
authored
Merge pull request #144 from Pkylas007/MTA-4540-RHBK
MTA-4540 Red Hat Build of Keycloak
2 parents 181d870 + ec568e9 commit 9b2c1a6

File tree

2 files changed

+18
-15
lines changed

2 files changed

+18
-15
lines changed

docs/topics/mta-7-installing-web-console-on-openshift.adoc

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -267,34 +267,35 @@ To prevent out-of-memory events and protect nodes, use the `--eviction-hard` set
267267
The amount of memory available for running pods on this node is 28.9 GB. This amount is calculated by subtracting the `system-reserved` and `eviction-hard` values from the overall capacity of the node. If the memory usage exceeds this amount, the node starts evicting pods.
268268

269269

270-
[id="mta-7-red-hat-single-sign-on_{context}"]
271-
== Red Hat Single Sign-On
270+
[id="mta-7-red-hat-build-of-keycloak_{context}"]
271+
== Red Hat Build of Keycloak
272272

273-
The {ProductShortName} uses link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6[Red Hat Single Sign-On (RHSSO)] instance for user authentication and authorization.
273+
The {ProductShortName} 7.3.0 uses link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0[{rhbk-first}] instance for user authentication and authorization.
274274

275-
The {ProductShortName} operator manages the RHSSO instance and configures a dedicated link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms[realm] with necessary roles and permissions.
275+
The {ProductShortName} operator manages the {rhbk-short} instance and configures a dedicated link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0/html/server_administration_guide/configuring-realms[realm] with necessary roles and permissions.
276276

277-
{ProductShortName}-managed RHSSO instance allows you to perform advanced RHSSO configurations, such as link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding a provider for User Federation] or link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers]. To access the link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[RHSSO Admin Console], enter the URL https://<_route_>/auth/admin in your browser by replacing <route> with the {ProductShortName} web console address.
277+
{ProductShortName}-managed {rhbk-short} instance allows you to perform advanced {rhbk-short} configurations, such as link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0/html/server_administration_guide/user-storage-federation#adding_a_provider[adding a provider for User Federation] or link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0/html/server_administration_guide/identity_broker[integrating identity providers]. To access the link:hhttps://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0/html/server_administration_guide/configuring-realms#using_the_admin_console[{rhbk-short} Admin Console], enter the URL https://<_route_>/auth/admin in your browser by replacing < _route_ > with the {ProductShortName} web console address.
278278

279279
Example:
280280

281281
* MTA web console: https://mta-openshiftmta.example.com/
282-
* RHSSO Admin console: https://mta-openshiftmta.example.com/auth/admin
282+
* {rhbk-short} Admin console: https://mta-openshiftmta.example.com/auth/admin
283283

284-
The admin credentials for RHSSO are stored in a secret file named `credential-mta-rhsso` in the namespace where {ProductShortName} is installed.
284+
The admin credentials for {rhbk-short} are stored in a secret file named `mta-keycloak-rhbk` in the namespace where {ProductShortName} is installed.
285285

286286
To retrieve your admin credentials, run the following command:
287+
[source,terminal]
287288
----
288-
oc get secret credential-mta-rhsso -o yaml
289+
$ oc get secret mta-keycloak-rhbk -n openshift-mta -o json| jq -r '.data.password | @base64d'
289290
----
290291

291-
To create a dedicated route for the RHSSO instance, set the `rhsso_external_access` parameter to `true` in the Tackle custom resource (CR) for {ProductShortName}.
292+
//To create a dedicated route for the {rhbk-short} instance, set the `rhsso_external_access` parameter to `true` in the Tackle custom resource (CR) for {ProductShortName}. #QE asked to remove this line.
292293

293-
include::analyzer-rbac-snippet.adoc[]
294+
//include::analyzer-rbac-snippet.adoc[]
294295

295296
.Additional resources
296-
* link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/server_administration_guide/index#ldap[Configuring LDAP and Active Directory in RHSSO]
297-
* link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/red_hat_single_sign_on_features_and_concepts[Red Hat Single Sign-On features and concepts]
297+
* link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0/html/server_administration_guide/user-storage-federation#ldap[Configuring LDAP and Active Directory in {rhbk-short}]
298+
* link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0/html/server_administration_guide/red_hat_build_of_keycloak_features_and_concepts[Red Hat Build of Keycloak features and concepts]
298299

299300
[id="mta-roles-personas-users-permissions_{context}"]
300301
=== Roles, Personas, Users, and Permissions
@@ -317,9 +318,9 @@ include::analyzer-rbac-snippet.adoc[]
317318
|Migrator
318319
|====
319320

320-
The roles are already defined in your RHSSO instance. You do not need to create them.
321+
The roles are already defined in your {rhbk-short} instance. You do not need to create them.
321322

322-
If you are an {ProductShortName} administrator, you can create users in your RHSSO and assign each user one or more roles, one role per persona.
323+
If you are an {ProductShortName} administrator, you can create users in your {rhbk-short} and assign each user one or more roles, one role per persona.
323324

324325
[id="mta-roles-personas-ui-views_{context}"]
325326
==== Roles, personas, and access to {WebName} views
@@ -360,7 +361,7 @@ The ability of administrators, architects, and migrators to access the *Administ
360361
[id="mta-roles-permissions_{context}"]
361362
==== Roles and permissions
362363

363-
The following table contains the roles and permissions (scopes) that {ProductShortName} seeds the managed RHSSO instance with:
364+
The following table contains the roles and permissions (scopes) that {ProductShortName} seeds the managed {rhbk-short} instance with:
364365

365366
[width="100%",cols="34%,33%,33%",]
366367
|====

docs/topics/templates/document-attributes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ ifdef::mta[]
1919
:ProductFullName: Migration Toolkit for Applications (MTA)
2020
:LC_PSN: mta
2121
:mta-cli: mta-cli
22+
:rhbk-first: Red Hat Build of Keycloak (RHBK)
23+
:rhbk-short: RHBK
2224
:DocInfoProductNameURL: migration_toolkit_for_applications
2325
:WebName: user interface
2426
:WebNameTitle: User Interface

0 commit comments

Comments
 (0)