Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions examples/custom-resources/jwks/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ To set up Keycloak:

3. Create a new Client called `jwks-client`. This can be done by selecting the `Client`s tab on the left and then
selecting `Create client`.
- When creating the Client, ensure both `Client authentication` and `Authorization` are enabled.
- When creating the Client, ensure both `Client authentication`, `Authorization` & `Direct access grants` are enabled.

4. Once the client is created, navigate to the `Credentials` tab for that client and copy the client secret.
- This can be saved in the `SECRET` shell variable for later:
Expand All @@ -75,7 +75,7 @@ To set up Keycloak:
export SECRET=<client secret>
```

5. Create a new User called `jwks-user` by selecting the Users tab on the left and then selecting Create client.
5. Create a new User called `jwks-user` by selecting the Users tab on the left and then selecting Create client. Ensure an email, first & last name are set.

6. Once the user is created, navigate to the `Credentials` tab for that user and select `Set password`. For this example
the password can be whatever you want.
Expand Down
12 changes: 7 additions & 5 deletions examples/custom-resources/jwks/keycloak.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -31,15 +31,17 @@ spec:
spec:
containers:
- name: keycloak
image: quay.io/keycloak/keycloak:20.0.5
image: quay.io/keycloak/keycloak:26.4.0
args: ["start-dev"]
env:
- name: KEYCLOAK_ADMIN
- name: KC_BOOTSTRAP_ADMIN_USERNAME
value: "admin"
- name: KEYCLOAK_ADMIN_PASSWORD
- name: KC_BOOTSTRAP_ADMIN_PASSWORD
value: "admin"
- name: KC_PROXY
value: "edge"
- name: KC_HTTP_ENABLED
value: "true"
- name: KC_PROXY_HEADERS
value: "xforwarded"
ports:
- name: http
containerPort: 8080
Expand Down
12 changes: 7 additions & 5 deletions examples/custom-resources/oidc/keycloak.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -31,15 +31,17 @@ spec:
spec:
containers:
- name: keycloak
image: quay.io/keycloak/keycloak:25.0.2
image: quay.io/keycloak/keycloak:26.4.0
args: ["start-dev"]
env:
- name: KEYCLOAK_ADMIN
- name: KC_BOOTSTRAP_ADMIN_USERNAME
value: "admin"
- name: KEYCLOAK_ADMIN_PASSWORD
- name: KC_BOOTSTRAP_ADMIN_PASSWORD
value: "admin"
- name: KC_PROXY
value: "edge"
- name: KC_HTTP_ENABLED
value: "true"
- name: KC_PROXY_HEADERS
value: "xforwarded"
ports:
- name: http
containerPort: 8080
Expand Down
2 changes: 1 addition & 1 deletion examples/custom-resources/oidc/keycloak_setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ This guide will help you configure KeyCloak using Keycloak's API:

**Notes**:

- This guide has been tested with keycloak 19.0.2 and later. If you modify `keycloak.yaml` to use an older version,
- This guide has been tested with keycloak 26.4.0 and later. If you modify `keycloak.yaml` to use an older version,
Keycloak may not start correctly or the commands in this guide may not work as expected. The Keycloak OpenID
endpoints `oidc.yaml` might also be different in older versions of Keycloak.
- if you changed the admin username and password for Keycloak in `keycloak.yaml`, modify the commands accordingly.
Expand Down
Loading