Skip to content

Commit 86918e6

Browse files
committed
RHBK v24 support for RHDH 1.4
1 parent fa54f2e commit 86918e6

7 files changed

+45
-43
lines changed

artifacts/attributes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@
3535
:openshift-cli: pass:quotes[OpenShift CLI (`oc`)]
3636
:rhsso-brand-name: Red Hat Single-Sign On
3737
:rhsso: RHSSO
38+
:rhbk-brand-name: Red Hat Build of Keycloak
39+
:rhbk: RHBK
3840

3941
// Partner Platforms
4042
:aws-brand-name: Amazon Web Services
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
[id="assembly-authenticating-with-rhbk"]
2+
= Authenticating with {rhbk-brand-name} ({rhbk})
3+
4+
To authenticate users with {rhbk-brand-name} ({rhbk}):
5+
6+
. xref:enabling-authentication-with-rhbk[Enable the OpenID Connect (OIDC) authentication provider in RHDH].
7+
. xref:provisioning-users-from-rhbk-to-the-software-catalog[Provision users from {rhbk-brand-name} ({rhbk}) to the software catalog].
8+
9+
include::modules/authentication/proc-enabling-authentication-with-rhbk.adoc[leveloffset=+1]
10+
11+
include::modules/authentication/proc-provisioning-users-from-rhbk-to-the-software-catalog.adoc[leveloffset=+1]
12+
13+
include::modules/authentication/proc-creating-a-custom-transformer-to-provision-users-from-rhbk-to-the-software-catalog.adoc[leveloffset=+1]

assemblies/assembly-authenticating-with-rhsso.adoc

Lines changed: 0 additions & 13 deletions
This file was deleted.

assemblies/assembly-enabling-authentication.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Therefore, deleting users and groups by using {product-short} Web UI or REST API
5353
include::assembly-authenticating-with-the-guest-user.adoc[leveloffset=+1]
5454

5555

56-
include::assembly-authenticating-with-rhsso.adoc[leveloffset=+1]
56+
include::assembly-authenticating-with-rhbk.adoc[leveloffset=+1]
5757

5858

5959
include::assembly-authenticating-with-github.adoc[leveloffset=+1]
Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
[id="creating-a-custom-transformer-to-provision-users-from-rhsso-to-the-software-catalog"]
2-
= Creating a custom transformer to provision users from {rhsso-brand-name} ({rhsso}) to the software catalog
1+
[id="creating-a-custom-transformer-to-provision-users-from-rhbk-to-the-software-catalog"]
2+
= Creating a custom transformer to provision users from {rhbk-brand-name} ({rhbk}) to the software catalog
33

4-
To customize how {rhsso} users and groups are mapped to {product} entities, you can create a backend module that uses the `keycloakTransformerExtensionPoint` to provide custom user and group transformers for the Keycloak backend.
4+
To customize how {rhbk} users and groups are mapped to {product} entities, you can create a backend module that uses the `keycloakTransformerExtensionPoint` to provide custom user and group transformers for the Keycloak backend.
55

66
.Prerequisites
7-
* You have xref:provisioning-users-from-rhsso-to-the-software-catalog[enabled provisioning users from {rhsso-brand-name} ({rhsso}) to the software catalog].
7+
* You have xref:provisioning-users-from-rhbk-to-the-software-catalog[enabled provisioning users from {rhbk-brand-name} ({rhbk}) to the software catalog].
88

99
.Procedure
1010
. Create a new backend module with the `yarn new` command.
@@ -85,8 +85,8 @@ Check the console logs to verify that the synchronization is completed.
8585

8686
* After the first import is complete, navigate to the *Catalog* page and select **User** to view the list of users.
8787

88-
* When you select a user, you see the information imported from {rhsso}.
88+
* When you select a user, you see the information imported from {rhbk}.
8989

90-
* You can select a group, view the list, and access or review the information imported from {rhsso}.
90+
* You can select a group, view the list, and access or review the information imported from {rhbk}.
9191

92-
* You can log in with an {rhsso} account.
92+
* You can log in with an {rhbk} account.

modules/authentication/proc-enabling-authentication-with-rhsso.adoc renamed to modules/authentication/proc-enabling-authentication-with-rhbk.adoc

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,45 +1,45 @@
1-
[id="enabling-authentication-with-rhsso"]
2-
= Enabling authentication with {rhsso-brand-name} ({rhsso})
1+
[id="enabling-authentication-with-rhbk"]
2+
= Enabling authentication with {rhbk-brand-name} ({rhbk})
33

4-
To authenticate users with Red Hat Single Sign-On ({rhsso}), enable the OpenID Connect (OIDC) authentication provider in {product}.
4+
To authenticate users with {rhbk-brand-name} ({rhbk}), enable the OpenID Connect (OIDC) authentication provider in {product}.
55

66

77
.Prerequisites
88
* You link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/administration_guide_for_red_hat_developer_hub/assembly-add-custom-app-file-openshift_admin-rhdh[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
9-
* You have sufficient permissions in {rhsso} to create and manage a realm.
9+
* You have sufficient permissions in {rhbk} to create and manage a realm.
1010

1111
.Procedure
12-
. To allow {product-short} to authenticate with {rhsso}, complete the steps in {rhsso}, to link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#realms-apps_[create a realm and a user] and link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[register the {product-short} application]:
12+
. To allow {product-short} to authenticate with {rhbk}, complete the steps in {rhbk}, to link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#realms-apps_[create a realm and a user] and link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[register the {product-short} application]:
1313

1414
.. Use an existing realm, or link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#create-realm_[create a realm], with a distinctive **Name** such as __<my_realm>__.
1515
Save the value for the next step:
16-
* **{rhsso} realm base URL**, such as: __<your_rhsso_URL>__/auth/realms/__<your_realm>__.
16+
* **{rhbk} realm base URL**, such as: __<your_rhbk_URL>__/realms/__<your_realm>__.
1717

18-
.. To register your {product-short} in {rhsso}, in the created realm, link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[create a Client ID], with:
18+
.. To register your {product-short} in {rhbk}, in the created realm, link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[create a Client ID], with:
1919
... **Client ID**: A distinctive client ID, such as __<{product-very-short}>__.
2020
... **Valid redirect URIs**: Set to the OIDC handler URL: `https://__<RHDH_URL>__/api/auth/oidc/handler/frame`.
2121
... Navigate to the **Credentials** tab and copy the **Client secret**.
2222
... Save the values for the next step:
2323
* **Client ID**
2424
* **Client Secret**
2525

26-
.. Configure your {rhsso} realm for performance and security:
26+
.. Configure your {rhbk} realm for performance and security:
2727
... Navigate to the **Configure** > **Realm Settings**.
2828
... Set the **Access Token Lifespan** to a value greater than five minutes (preferably 10 or 15 minutes) to prevent performance issues from frequent refresh token requests for every API call.
2929
... Enable the **Revoke Refresh Token** option to improve security by enabling the refresh token rotation strategy.
3030

3131
.. To prepare for the verification steps, in the same realm, get the credential information for an existing user or link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#create-user_[create a user]. Save the user credential information for the verification steps.
3232

33-
. To add your {rhsso} credentials to your {product-short} secrets, edit your {product-short} secrets, such as `secrets-rhdh`, and add the following key/value pairs:
33+
. To add your {rhbk} credentials to your {product-short} secrets, edit your {product-short} secrets, such as `secrets-rhdh`, and add the following key/value pairs:
3434
+
3535
`AUTH_OIDC_CLIENT_ID`:: Enter the saved **Client ID**.
3636
`AUTH_OIDC_CLIENT_SECRET`:: Enter the saved **Client Secret**.
37-
`AUTH_OIDC_METADATA_URL`:: Enter the saved **{rhsso} realm base URL**.
37+
`AUTH_OIDC_METADATA_URL`:: Enter the saved **{rhbk} realm base URL**.
3838

39-
. To set up the {rhsso} authentication provider in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
39+
. To set up the {rhbk} authentication provider in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
4040
+
4141
--
42-
.`app-config-rhdh.yaml` fragment with mandatory fields to enable authentication with {rhsso}
42+
.`app-config-rhdh.yaml` fragment with mandatory fields to enable authentication with {rhbk}
4343
[source,yaml]
4444
----
4545
auth:
@@ -90,7 +90,7 @@ dangerouslyAllowSignInWithoutUserInCatalog: true
9090

9191
`callbackUrl`::
9292
--
93-
{rhsso} callback URL.
93+
{rhbk} callback URL.
9494

9595
.`app-config-rhdh.yaml` fragment with optional `callbackURL` field
9696
[source,yaml]
@@ -135,7 +135,7 @@ auth:
135135

136136
`scope`::
137137
--
138-
{rhsso} scope.
138+
{rhbk} scope.
139139

140140
.`app-config-rhdh.yaml` fragment with optional `scope` field
141141
[source,yaml]

modules/authentication/proc-provisioning-users-from-rhsso-to-the-software-catalog.adoc renamed to modules/authentication/proc-provisioning-users-from-rhbk-to-the-software-catalog.adoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
[id="provisioning-users-from-rhsso-to-the-software-catalog"]
2-
= Provisioning users from {rhsso-brand-name} ({rhsso}) to the software catalog
1+
[id="provisioning-users-from-rhbk-to-the-software-catalog"]
2+
= Provisioning users from {rhbk-brand-name} ({rhbk}) to the software catalog
33

44
.Prerequisites
5-
* You xref:enabling-authentication-with-rhsso[enabled authentication with {rhsso}].
5+
* You xref:enabling-authentication-with-rhbk[enabled authentication with {rhbk}].
66

77
.Procedure
88

9-
* To enable {rhsso} member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
9+
* To enable {rhbk} member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
1010
+
1111
--
1212
[id=keycloakOrgProviderId]
@@ -27,13 +27,13 @@ catalog:
2727
Allow authentication only for users present in the {product-short} software catalog.
2828

2929
`baseUrl`::
30-
Your {rhsso} server URL, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
30+
Your {rhbk} server URL, defined when xref:enabling-authentication-with-rhbk[enabling authentication with {rhbk}].
3131

3232
`clientId`::
33-
Your {product-short} application client ID in {rhsso}, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
33+
Your {product-short} application client ID in {rhbk}, defined when xref:enabling-authentication-with-rhbk[enabling authentication with {rhbk}].
3434

3535
`clientSecret`::
36-
Your {product-short} application client secret in {rhsso}, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
36+
Your {product-short} application client secret in {rhbk}, defined when xref:enabling-authentication-with-rhbk[enabling authentication with {rhbk}].
3737

3838
Optional: Consider adding the following optional fields:
3939

@@ -150,4 +150,4 @@ catalog:
150150
{"class":"KeycloakOrgEntityProvider","level":"info","message":"Committed 3 Keycloak users and 2 Keycloak groups in 0.0 seconds.","plugin":"catalog","service":"backstage","taskId":"KeycloakOrgEntityProvider:default:refresh","taskInstanceId":"bf0467ff-8ac4-4702-911c-380270e44dea","timestamp":"2024-09-25 13:58:04"}
151151
----
152152

153-
. Log in with an {rhsso} account.
153+
. Log in with an {rhbk} account.

0 commit comments

Comments
 (0)