keycloak-config-cli
nginx-openid-connect
keycloak-config-cli | nginx-openid-connect | |
---|---|---|
10 | 9 | |
672 | 188 | |
3.0% | 1.1% | |
8.1 | 2.5 | |
4 days ago | 16 days ago | |
Java | JavaScript | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
keycloak-config-cli
-
Beyond the login page
Most of the time nowadays, I prefer offloading this to an identity provider, using OpenID Connect or soon Federated Credential Management (FedCM), even if that means shipping an identity provider as part of the deliverables (I generally go with Keycloak, with keycloak-config-cli to provision its configuration). I'm obviously biased though as I work in IT services, developping software mainly for intranets/extranets, and companies now increasingly have their own identity providers or at a minimum have that in their roadmap. So YMMV.
-
Keycloak – Open-Source Identity and Access Management Interview
> But it is painful share the setup with other engineers.
We used keycloak-config-cli [1] it compares a config file stripped of IDs to your Keycloak installation and makes the relevant updates through the REST API.
[1] https://github.com/adorsys/keycloak-config-cli
- Keycloak with PostgreSQL on Kubernetes
-
Is Keycloak ready for Kubernetes?
As far as I know, the state of the art is https://github.com/adorsys/keycloak-config-cli , but I haven't played with that yet. It seems to be a big improvement over other solutions, because it can update configurations and the configurations can be "clean".
- Add keycloak configurations through script
-
Noob question about self-hosting on a VPS
One alternative is to use the admin APIs instead of the UI. You'd SSH into the host and then use curl or https://github.com/adorsys/keycloak-config-cli to configure keycloak. I use the keycloak-config-cli for my setup. It's both how I manage disaster recovery and make changes to configuration.
-
Keycloak; docker or dedicated?
I'm not saying that keycloak is always easy to work with. The thing I found hardest to figure out was how to automate disaster recovery. I want to be able to rebuild my entire auth configuration from scratch including users, default passwords, oauth clients, JWT mappings, etc. The only way I found to do this was to use https://github.com/adorsys/keycloak-config-cli. tl;dr It uses the admin API to provision items. You can export a configured realm, manually tweak some parts of it like enter passwords and add users, and then run it against a keycloak instance to restore everything.
-
Keycloak config management?
I've found this https://github.com/adorsys/keycloak-config-cli and it looks really promising. It can update the configs without a need to restart the whole keycloak instance.
-
Nginx auth_request and Keycloak?
If you do end up using a setup like this then I highly recommend that you look into https://github.com/adorsys/keycloak-config-cli. tl;dr You can export your realm configuration once set up and then use it to restore your system should you lose your keycloak data. It can also be used to provision users but you have to manually add them to the realm export because they are not included in an export for some reason. All the different objects it can manage are documented here: https://www.keycloak.org/docs-api/17.0/rest-api/index.html#_realmrepresentation.
nginx-openid-connect
-
OIDC filter
Could you please suggest an OIDC filter/side-car which is capable of configure it with a custom IDP? Nginx Plus has a OIDC filter https://github.com/nginxinc/nginx-openid-connect and looking for a similar solution. I am planning to use AKS for api and Web compute. Thanks!
-
Keycloak – Open-Source Identity and Access Management Interview
> With both Apache and Nginx you can let the web server do all the OpenID Connect work for you for paths you specify.
Seems like at least the official nginx solution for this requires their paid subscription: https://github.com/nginxinc/nginx-openid-connect
Got any tips for how to do it with their open-source solution?
- User friendly reverse proxy suitable for production
-
Cosmos-Server now in version 0.3.0 with 2 Factor Authentication: A User-Friendly, Self-Hosted Alternative to using Cloudflare Tunnel to secure your applications
It's not a matter of better or worst security than Traefik or NGINX, it's that if you do not have entreprise level licence for those software, you don't actually have the security modules that protect your services (ex. https://www.nginx.com/products/nginx/) Cosmos includes a WAF by default without subscription
- Microsites/apps (?) with NextJS
-
Where and how do you store your access_token and refresh_token in Oauth2.0 authorization flow?
You can scale up it with side car pattern with K8. One product you can use is https://github.com/nginxinc/nginx-openid-connect and if you Azure they have a built in capability as well. I haven't worked with AWS for a while but probably they will have an equal solution.
- Proper way to proxy all calls to an external API through the Next.js server? (Make SSR components work with client auth cookies)
-
Is it possible to control some parameters of Nginx programatically
You could purchase NGINX Plus which allows many things to be configured via API calls.
-
Azure AD Authentication
If you have an active Nginx plus subscription the OIDC implementation will help. https://github.com/nginxinc/nginx-openid-connect
What are some alternatives?
testcontainers-spring-boot - Container auto-configurations for Spring Boot based integration tests
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
private_server - This is the configuration for my private server, with the intention of never having to use manual SSH.
cloudfront-auth - An AWS CloudFront Lambda@Edge function to authenticate requests using Google Apps, Microsoft, Auth0, OKTA, and GitHub login
vouch-proxy - an SSO and OAuth / OIDC login solution for Nginx using the auth_request module
crossplane - Quick and reliable way to convert NGINX configurations into JSON and back.
lua-resty-openidc - OpenID Connect Relying Party and OAuth 2.0 Resource Server implementation in Lua for NGINX / OpenResty
component-keycloak - Commodore Component for Keycloak
nginx-wrapper - NGINX Event Process Wrapper
terraform-provider-keycloak - Terraform provider for Keycloak
typescript - Typescript packages and application to showcase the ZITADEL resource API