|  | 
|  | 1 | +--- | 
|  | 2 | +apiVersion: v1 | 
|  | 3 | +kind: Secret | 
|  | 4 | +metadata: | 
|  | 5 | +  name: user-info-fetcher-client-credentials | 
|  | 6 | +stringData: | 
|  | 7 | +  clientId: user-info-fetcher | 
|  | 8 | +  clientSecret: user-info-fetcher-client-secret | 
|  | 9 | +--- | 
|  | 10 | +apiVersion: v1 | 
|  | 11 | +kind: ConfigMap | 
|  | 12 | +metadata: | 
|  | 13 | +  name: keycloak-my-dataspace-realm | 
|  | 14 | +data: | 
|  | 15 | +  realm.json: | | 
|  | 16 | +    { | 
|  | 17 | +      "realm" : "my-dataspace", | 
|  | 18 | +      "enabled" : true, | 
|  | 19 | +      "groups" : [ { | 
|  | 20 | +        "name" : "group-user", | 
|  | 21 | +        "path" : "/group-user" | 
|  | 22 | +      } ], | 
|  | 23 | +      "users" : [ { | 
|  | 24 | +        "username" : "service-account-user-info-fetcher", | 
|  | 25 | +        "enabled" : true, | 
|  | 26 | +        "totp" : false, | 
|  | 27 | +        "emailVerified" : false, | 
|  | 28 | +        "serviceAccountClientId" : "user-info-fetcher", | 
|  | 29 | +        "credentials" : [ ], | 
|  | 30 | +        "disableableCredentialTypes" : [ ], | 
|  | 31 | +        "requiredActions" : [ ], | 
|  | 32 | +        "realmRoles" : [ "default-roles-my-dataspace" ], | 
|  | 33 | +        "clientRoles" : { | 
|  | 34 | +          "realm-management" : [ | 
|  | 35 | +            "view-users" | 
|  | 36 | +          ] | 
|  | 37 | +        }, | 
|  | 38 | +        "notBefore" : 0, | 
|  | 39 | +        "groups" : [ ] | 
|  | 40 | +      }, | 
|  | 41 | +      { | 
|  | 42 | +          "enabled": true, | 
|  | 43 | +          "username": "alice", | 
|  | 44 | + | 
|  | 45 | +          "credentials": [ | 
|  | 46 | +            { | 
|  | 47 | +              "type": "password", | 
|  | 48 | +              "value": "aj238dSbs72k" | 
|  | 49 | +            } | 
|  | 50 | +          ], | 
|  | 51 | +          "realmRoles": [ | 
|  | 52 | +            "Test1", | 
|  | 53 | +            "Test2" | 
|  | 54 | +          ] | 
|  | 55 | +        } | 
|  | 56 | +      ], | 
|  | 57 | +      "roles": { | 
|  | 58 | +        "realm": [ | 
|  | 59 | +          { | 
|  | 60 | +            "name": "Test1", | 
|  | 61 | +            "description": "Test1" | 
|  | 62 | +          }, | 
|  | 63 | +          { | 
|  | 64 | +            "name": "Test2", | 
|  | 65 | +            "description": "Test2" | 
|  | 66 | +          } | 
|  | 67 | +        ] | 
|  | 68 | +      }, | 
|  | 69 | +      "clients" : [ { | 
|  | 70 | +        "clientId" : "${USER_INFO_FETCHER_CLIENT_ID}", | 
|  | 71 | +        "surrogateAuthRequired" : false, | 
|  | 72 | +        "enabled" : true, | 
|  | 73 | +        "alwaysDisplayInConsole" : false, | 
|  | 74 | +        "clientAuthenticatorType" : "client-secret", | 
|  | 75 | +        "secret" : "${USER_INFO_FETCHER_CLIENT_SECRET}", | 
|  | 76 | +        "redirectUris" : [ "/*" ], | 
|  | 77 | +        "webOrigins" : [ "/*" ], | 
|  | 78 | +        "notBefore" : 0, | 
|  | 79 | +        "bearerOnly" : false, | 
|  | 80 | +        "serviceAccountsEnabled" : true, | 
|  | 81 | +        "publicClient" : false, | 
|  | 82 | +        "frontchannelLogout" : true, | 
|  | 83 | +        "protocol" : "openid-connect", | 
|  | 84 | +        "attributes" : { | 
|  | 85 | +          "oidc.ciba.grant.enabled" : "true", | 
|  | 86 | +          "oauth2.device.authorization.grant.enabled" : "false" | 
|  | 87 | +        }, | 
|  | 88 | +        "authenticationFlowBindingOverrides" : { }, | 
|  | 89 | +        "fullScopeAllowed" : true | 
|  | 90 | +      } ] | 
|  | 91 | +    } | 
0 commit comments