keycloak-config-cli
lldap
keycloak-config-cli | lldap | |
---|---|---|
10 | 76 | |
672 | 3,499 | |
3.1% | 3.7% | |
8.1 | 9.1 | |
4 days ago | 7 days ago | |
Java | Rust | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
keycloak-config-cli
-
Beyond the login page
Most of the time nowadays, I prefer offloading this to an identity provider, using OpenID Connect or soon Federated Credential Management (FedCM), even if that means shipping an identity provider as part of the deliverables (I generally go with Keycloak, with keycloak-config-cli to provision its configuration). I'm obviously biased though as I work in IT services, developping software mainly for intranets/extranets, and companies now increasingly have their own identity providers or at a minimum have that in their roadmap. So YMMV.
-
Keycloak – Open-Source Identity and Access Management Interview
> But it is painful share the setup with other engineers.
We used keycloak-config-cli [1] it compares a config file stripped of IDs to your Keycloak installation and makes the relevant updates through the REST API.
[1] https://github.com/adorsys/keycloak-config-cli
- Keycloak with PostgreSQL on Kubernetes
-
Is Keycloak ready for Kubernetes?
As far as I know, the state of the art is https://github.com/adorsys/keycloak-config-cli , but I haven't played with that yet. It seems to be a big improvement over other solutions, because it can update configurations and the configurations can be "clean".
- Add keycloak configurations through script
-
Noob question about self-hosting on a VPS
One alternative is to use the admin APIs instead of the UI. You'd SSH into the host and then use curl or https://github.com/adorsys/keycloak-config-cli to configure keycloak. I use the keycloak-config-cli for my setup. It's both how I manage disaster recovery and make changes to configuration.
-
Keycloak; docker or dedicated?
I'm not saying that keycloak is always easy to work with. The thing I found hardest to figure out was how to automate disaster recovery. I want to be able to rebuild my entire auth configuration from scratch including users, default passwords, oauth clients, JWT mappings, etc. The only way I found to do this was to use https://github.com/adorsys/keycloak-config-cli. tl;dr It uses the admin API to provision items. You can export a configured realm, manually tweak some parts of it like enter passwords and add users, and then run it against a keycloak instance to restore everything.
-
Keycloak config management?
I've found this https://github.com/adorsys/keycloak-config-cli and it looks really promising. It can update the configs without a need to restart the whole keycloak instance.
-
Nginx auth_request and Keycloak?
If you do end up using a setup like this then I highly recommend that you look into https://github.com/adorsys/keycloak-config-cli. tl;dr You can export your realm configuration once set up and then use it to restore your system should you lose your keycloak data. It can also be used to provision users but you have to manually add them to the realm export because they are not included in an export for some reason. All the different objects it can manage are documented here: https://www.keycloak.org/docs-api/17.0/rest-api/index.html#_realmrepresentation.
lldap
-
Keycloak SSO with Docker Compose and Nginx
Good to hear, I think it'll make many users happy. For me, I've migrated back to Authelia. I moved to authentik because at the time Authelia had no user management. After all of authentik's sharp edges, I've found lldap[0], and was able to implement a pilot in a few hours. I haven't looked back, since everything was converted.
[0]: https://github.com/lldap/lldap
-
Ask HN: What apps have you created for your own use?
I wrote LLDAP (https://github.com/lldap/lldap) after struggling to install and configure openLdap on my homelab.
-
Anyone else using LLDAP and if so... (can it do TrueNAS & Linux User/Login authentication?)
I've recently installed and configured LLDAP (Lightweight LDAP) - More details here if you've never heard of it before: GitHub - lldap/lldap: Light LDAP implementation
- Lldap Release 0.5.0
-
🆕 Cosmos 0.8.0 - All in one secure Reverse-proxy, container manager and authentication provider has a brand new App Marketplace to share compose file! Also added home customization
I've an LLDAP instance running to make managing users easier.
- Simple AD for testing stuff in homelab?
-
LDAP resources/recommendations question
I'm trying to integrate LDAP into my small homelab but I'm extreme noobie in it. So far I've tried: 1. OpenLDAP - not so resource heavy but I found it difficult go get working correctly with NextCloud, Keycloak and Jellyfin. Maybe someone could recommend an easy to follow guide? 2. LLDAP - honestly it's almost prefect. Nice clean UI, great guides how to setup with everything I need, but it's a read-only LDAP, so I cannot create or manage users with Keycloak or NC, that's about the only downside and probably bugs me more than it should. 3. 389ds - has everything I need (and probably some more), super easy to setup with this guide but the elephant in the room is that it uses 700MiB of RAM (whereas LLDAP uses only 7-8MiB). That's a big difference which really makes me question whether I want to use this particular solution.
-
Keycloak – Open-Source Identity and Access Management Interview
Note that if you want to use KeyCloak for the OpenID but want to still have a LDAP source of truth, you can use LLDAP + KeyCloak together, with LLDAP as the source of truth and KeyCloak giving you the fancy features: https://github.com/lldap/lldap/blob/main/example_configs/key...
- 🆕 Cosmos 0.6.0 - All in one secure Reverse-proxy, container manager and authentication provider now supports OpenID! Guides available in the documentation on how to setup Nextcloud, Minio and Gitea easily from the UI.
-
How do you organize accounts and passwords in your self-hosted environment?
To be fair, their respective documentations (here and here) are pretty comprehensive.
What are some alternatives?
testcontainers-spring-boot - Container auto-configurations for Spring Boot based integration tests
glauth - A lightweight LDAP server for development, home use, or CI
nginx-openid-connect - Reference implementation of OpenID Connect integration for NGINX Plus
ntfy - Send push notifications to your phone or desktop using PUT/POST
private_server - This is the configuration for my private server, with the intention of never having to use manual SSH.
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
vouch-proxy - an SSO and OAuth / OIDC login solution for Nginx using the auth_request module
authentik - The authentication glue you need.
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
PropertyWebBuilder - Create a fully featured real estate website on Rails in minutes! ⛺
component-keycloak - Commodore Component for Keycloak
pwm - pwm