Skip to content

Commit f4e273c

Browse files
[release-1.4] RHIDP-4805: RHBK v24 support for RHDH 1.4 (#775)
* RHBK v24 support for RHDH 1.4 * Added note * review suggestions incorporated --------- Co-authored-by: Heena Manwani <[email protected]>
1 parent b611dd3 commit f4e273c

7 files changed

+52
-45
lines changed

artifacts/attributes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@
3535
:openshift-cli: pass:quotes[OpenShift CLI (`oc`)]
3636
:rhsso-brand-name: Red Hat Single-Sign On
3737
:rhsso: RHSSO
38+
:rhbk-brand-name: Red Hat Build of Keycloak
39+
:rhbk: RHBK
3840

3941
// Partner Platforms
4042
:aws-brand-name: Amazon Web Services
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[id="assembly-authenticating-with-rhbk"]
2+
= Authenticating with {rhbk-brand-name} ({rhbk})
3+
4+
[NOTE]
5+
====
6+
{rhsso} 7.6 is deprecated as an authentication provider. You can continue using {rhsso} until the end of its maintenance support. For more information, see link:https://access.redhat.com/support/policy/updates/jboss_notes#p_sso[{rhsso} lifecycle dates]. As an alternative, consider migrating to {rhbk-brand-name} ({rhbk}).
7+
====
8+
9+
To authenticate users with {rhbk-brand-name} ({rhbk}):
10+
11+
. xref:enabling-authentication-with-rhbk[Enable the OpenID Connect (OIDC) authentication provider in RHDH].
12+
. xref:provisioning-users-from-rhbk-to-the-software-catalog[Provision users from {rhbk-brand-name} ({rhbk}) to the software catalog].
13+
14+
include::modules/authentication/proc-enabling-authentication-with-rhbk.adoc[leveloffset=+1]
15+
16+
include::modules/authentication/proc-provisioning-users-from-rhbk-to-the-software-catalog.adoc[leveloffset=+1]
17+
18+
include::modules/authentication/proc-creating-a-custom-transformer-to-provision-users-from-rhbk-to-the-software-catalog.adoc[leveloffset=+1]

assemblies/assembly-authenticating-with-rhsso.adoc

Lines changed: 0 additions & 13 deletions
This file was deleted.

assemblies/assembly-enabling-authentication.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Therefore, deleting users and groups by using {product-short} Web UI or REST API
5353
include::assembly-authenticating-with-the-guest-user.adoc[leveloffset=+1]
5454

5555

56-
include::assembly-authenticating-with-rhsso.adoc[leveloffset=+1]
56+
include::assembly-authenticating-with-rhbk.adoc[leveloffset=+1]
5757

5858

5959
include::assembly-authenticating-with-github.adoc[leveloffset=+1]
Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
[id="creating-a-custom-transformer-to-provision-users-from-rhsso-to-the-software-catalog"]
2-
= Creating a custom transformer to provision users from {rhsso-brand-name} ({rhsso}) to the software catalog
1+
[id="creating-a-custom-transformer-to-provision-users-from-rhbk-to-the-software-catalog"]
2+
= Creating a custom transformer to provision users from {rhbk-brand-name} ({rhbk}) to the software catalog
33

4-
To customize how {rhsso} users and groups are mapped to {product} entities, you can create a backend module that uses the `keycloakTransformerExtensionPoint` to provide custom user and group transformers for the Keycloak backend.
4+
To customize how {rhbk} users and groups are mapped to {product} entities, you can create a backend module that uses the `keycloakTransformerExtensionPoint` to provide custom user and group transformers for the Keycloak backend.
55

66
.Prerequisites
7-
* You have xref:provisioning-users-from-rhsso-to-the-software-catalog[enabled provisioning users from {rhsso-brand-name} ({rhsso}) to the software catalog].
7+
* You have xref:provisioning-users-from-rhbk-to-the-software-catalog[enabled provisioning users from {rhbk-brand-name} ({rhbk}) to the software catalog].
88

99
.Procedure
1010
. Create a new backend module with the `yarn new` command.
@@ -85,8 +85,8 @@ Check the console logs to verify that the synchronization is completed.
8585

8686
* After the first import is complete, navigate to the *Catalog* page and select **User** to view the list of users.
8787

88-
* When you select a user, you see the information imported from {rhsso}.
88+
* When you select a user, you see the information imported from {rhbk}.
8989

90-
* You can select a group, view the list, and access or review the information imported from {rhsso}.
90+
* You can select a group, view the list, and access or review the information imported from {rhbk}.
9191

92-
* You can log in with an {rhsso} account.
92+
* You can log in with an {rhbk} account.

modules/authentication/proc-enabling-authentication-with-rhsso.adoc renamed to modules/authentication/proc-enabling-authentication-with-rhbk.adoc

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,45 +1,45 @@
1-
[id="enabling-authentication-with-rhsso"]
2-
= Enabling authentication with {rhsso-brand-name} ({rhsso})
1+
[id="enabling-authentication-with-rhbk"]
2+
= Enabling authentication with {rhbk-brand-name} ({rhbk})
33

4-
To authenticate users with Red Hat Single Sign-On ({rhsso}), enable the OpenID Connect (OIDC) authentication provider in {product}.
4+
To authenticate users with {rhbk-brand-name} ({rhbk}), enable the OpenID Connect (OIDC) authentication provider in {product}.
55

66

77
.Prerequisites
88
* You link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/administration_guide_for_red_hat_developer_hub/assembly-add-custom-app-file-openshift_admin-rhdh[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
9-
* You have sufficient permissions in {rhsso} to create and manage a realm.
9+
* You have sufficient permissions in {rhbk} to create and manage a realm.
1010

1111
.Procedure
12-
. To allow {product-short} to authenticate with {rhsso}, complete the steps in {rhsso}, to link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#realms-apps_[create a realm and a user] and link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[register the {product-short} application]:
12+
. To allow {product-short} to authenticate with {rhbk}, complete the steps in {rhbk}, to link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/24.0/html/getting_started_guide/getting-started-zip-#getting-started-zip-create-a-realm[create a realm and a user] and link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/24.0/html/getting_started_guide/getting-started-zip-#getting-started-zip-secure-the-first-application[secure the first application]:
1313

14-
.. Use an existing realm, or link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#create-realm_[create a realm], with a distinctive **Name** such as __<my_realm>__.
14+
.. Use an existing realm, or link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/24.0/html/getting_started_guide/getting-started-zip-#getting-started-zip-create-a-realm[create a realm], with a distinctive **Name** such as __<my_realm>__.
1515
Save the value for the next step:
16-
* **{rhsso} realm base URL**, such as: __<your_rhsso_URL>__/auth/realms/__<your_realm>__.
16+
* **{rhbk} realm base URL**, such as: __<your_rhbk_URL>__/realms/__<your_realm>__.
1717

18-
.. To register your {product-short} in {rhsso}, in the created realm, link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[create a Client ID], with:
18+
.. To register your {product-short} in {rhbk}, in the created realm, link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/24.0/html-single/getting_started_guide/index#getting-started-zip-secure-the-first-application[secure the first application], with:
1919
... **Client ID**: A distinctive client ID, such as __<{product-very-short}>__.
2020
... **Valid redirect URIs**: Set to the OIDC handler URL: `https://__<RHDH_URL>__/api/auth/oidc/handler/frame`.
2121
... Navigate to the **Credentials** tab and copy the **Client secret**.
2222
... Save the values for the next step:
2323
* **Client ID**
2424
* **Client Secret**
2525

26-
.. Configure your {rhsso} realm for performance and security:
26+
.. Configure your {rhbk} realm for performance and security:
2727
... Navigate to the **Configure** > **Realm Settings**.
2828
... Set the **Access Token Lifespan** to a value greater than five minutes (preferably 10 or 15 minutes) to prevent performance issues from frequent refresh token requests for every API call.
2929
... Enable the **Revoke Refresh Token** option to improve security by enabling the refresh token rotation strategy.
3030

31-
.. To prepare for the verification steps, in the same realm, get the credential information for an existing user or link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#create-user_[create a user]. Save the user credential information for the verification steps.
31+
.. To prepare for the verification steps, in the same realm, get the credential information for an existing user or link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/24.0/html-single/getting_started_guide/index#getting-started-zip-create-a-user[create a user]. Save the user credential information for the verification steps.
3232

33-
. To add your {rhsso} credentials to your {product-short} secrets, edit your {product-short} secrets, such as `secrets-rhdh`, and add the following key/value pairs:
33+
. To add your {rhbk} credentials to your {product-short} secrets, edit your {product-short} secrets, such as `secrets-rhdh`, and add the following key/value pairs:
3434
+
3535
`AUTH_OIDC_CLIENT_ID`:: Enter the saved **Client ID**.
3636
`AUTH_OIDC_CLIENT_SECRET`:: Enter the saved **Client Secret**.
37-
`AUTH_OIDC_METADATA_URL`:: Enter the saved **{rhsso} realm base URL**.
37+
`AUTH_OIDC_METADATA_URL`:: Enter the saved **{rhbk} realm base URL**.
3838

39-
. To set up the {rhsso} authentication provider in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
39+
. To set up the {rhbk} authentication provider in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
4040
+
4141
--
42-
.`app-config-rhdh.yaml` fragment with mandatory fields to enable authentication with {rhsso}
42+
.`app-config-rhdh.yaml` fragment with mandatory fields to enable authentication with {rhbk}
4343
[source,yaml]
4444
----
4545
auth:
@@ -90,7 +90,7 @@ dangerouslyAllowSignInWithoutUserInCatalog: true
9090

9191
`callbackUrl`::
9292
--
93-
{rhsso} callback URL.
93+
{rhbk} callback URL.
9494

9595
.`app-config-rhdh.yaml` fragment with optional `callbackURL` field
9696
[source,yaml]
@@ -135,7 +135,7 @@ auth:
135135

136136
`scope`::
137137
--
138-
{rhsso} scope.
138+
{rhbk} scope.
139139

140140
.`app-config-rhdh.yaml` fragment with optional `scope` field
141141
[source,yaml]

modules/authentication/proc-provisioning-users-from-rhsso-to-the-software-catalog.adoc renamed to modules/authentication/proc-provisioning-users-from-rhbk-to-the-software-catalog.adoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
[id="provisioning-users-from-rhsso-to-the-software-catalog"]
2-
= Provisioning users from {rhsso-brand-name} ({rhsso}) to the software catalog
1+
[id="provisioning-users-from-rhbk-to-the-software-catalog"]
2+
= Provisioning users from {rhbk-brand-name} ({rhbk}) to the software catalog
33

44
.Prerequisites
5-
* You xref:enabling-authentication-with-rhsso[enabled authentication with {rhsso}].
5+
* You xref:enabling-authentication-with-rhbk[enabled authentication with {rhbk}].
66

77
.Procedure
88

9-
* To enable {rhsso} member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
9+
* To enable {rhbk} member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
1010
+
1111
--
1212
[id=keycloakOrgProviderId]
@@ -27,13 +27,13 @@ catalog:
2727
Allow authentication only for users present in the {product-short} software catalog.
2828

2929
`baseUrl`::
30-
Your {rhsso} server URL, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
30+
Your {rhbk} server URL, defined when xref:enabling-authentication-with-rhbk[enabling authentication with {rhbk}].
3131

3232
`clientId`::
33-
Your {product-short} application client ID in {rhsso}, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
33+
Your {product-short} application client ID in {rhbk}, defined when xref:enabling-authentication-with-rhbk[enabling authentication with {rhbk}].
3434

3535
`clientSecret`::
36-
Your {product-short} application client secret in {rhsso}, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
36+
Your {product-short} application client secret in {rhbk}, defined when xref:enabling-authentication-with-rhbk[enabling authentication with {rhbk}].
3737

3838
Optional: Consider adding the following optional fields:
3939

@@ -150,4 +150,4 @@ catalog:
150150
{"class":"KeycloakOrgEntityProvider","level":"info","message":"Committed 3 Keycloak users and 2 Keycloak groups in 0.0 seconds.","plugin":"catalog","service":"backstage","taskId":"KeycloakOrgEntityProvider:default:refresh","taskInstanceId":"bf0467ff-8ac4-4702-911c-380270e44dea","timestamp":"2024-09-25 13:58:04"}
151151
----
152152

153-
. Log in with an {rhsso} account.
153+
. Log in with an {rhbk} account.

0 commit comments

Comments
 (0)