Skip to content

Commit 0cf062f

Browse files
authored
Merge pull request #56987 from ekristova/RHDEVDOCS-5017
RHDEVDOCS-5017: Update the docs for Keycloak configuration
2 parents 6bd4ec1 + e386e2f commit 0cf062f

File tree

2 files changed

+36
-3
lines changed

2 files changed

+36
-3
lines changed

cicd/gitops/configuring-sso-for-argo-cd-using-keycloak.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ After the {gitops-title} Operator is installed, Argo CD automatically creates a
1010

1111
.Prerequisites
1212
* Red Hat SSO is installed on the cluster.
13+
* {gitops-title} Operator is installed on the cluster.
1314
* Argo CD is installed on the cluster.
1415
1516
include::modules/gitops-creating-a-new-client-using-keycloak.adoc[leveloffset=+1]

modules/gitops-creating-a-new-client-using-keycloak.adoc

Lines changed: 35 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * configuring-sso-for-argo-cd-using-keycloak.adoc
4+
15
:_content-type: PROCEDURE
26
[id="gitops-creating-a-new-client-in-keycloak_{context}"]
37
= Configuring a new client in Keycloak
@@ -8,7 +12,7 @@ Dex is installed by default for all the Argo CD instances created by the Operato
812

913
To configure Keycloak, follow these steps:
1014

11-
. Delete the Dex configuration by removing the following section from the Argo CD Custom Resource (CR), and save the CR:
15+
. Delete the Dex configuration by removing the `.spec.sso.dex` parameter from the Argo CD custom resource (CR), and save the CR:
1216
+
1317
[source,yaml]
1418
----
@@ -23,7 +27,11 @@ dex:
2327
memory:
2428
----
2529

26-
. Configure Keycloak by editing the Argo CD CR, and updating the value for the `provider` parameter as `keycloak`. For example:
30+
. Set the value of the `provider` parameter to `keycloak` in the Argo CD CR.
31+
32+
. Configure Keycloak by performing one of the following steps:
33+
34+
* For a secure connection, set the value of the `rootCA` parameter as shown in the following example:
2735
+
2836
[source,yaml]
2937
----
@@ -36,9 +44,33 @@ metadata:
3644
spec:
3745
sso:
3846
provider: keycloak
47+
keycloak:
48+
rootCA: "<PEM-encoded-root-certificate>" <1>
3949
server:
4050
route:
41-
enabled: true
51+
enabled: true
52+
----
53+
<1> A custom certificate used to verify the Keycloak's TLS certificate.
54+
+
55+
The Operator reconciles changes in the `.spec.keycloak.rootCA` parameter and updates the `oidc.config` parameter with the PEM encoded root certificate in the `argocd-cm` configuration map.
56+
57+
* For an insecure connection, leave the value of the `rootCA` parameter empty and use the `oidc.tls.insecure.skip.verify` parameter as shown below:
58+
+
59+
[source,yaml]
60+
----
61+
apiVersion: argoproj.io/v1alpha1
62+
kind: ArgoCD
63+
metadata:
64+
name: example-argocd
65+
labels:
66+
example: basic
67+
spec:
68+
extraConfig:
69+
oidc.tls.insecure.skip.verify: "true"
70+
sso:
71+
provider: keycloak
72+
keycloak:
73+
rootCA: ""
4274
----
4375
4476
[NOTE]

0 commit comments

Comments
 (0)