keycloak-config-cli
vouch-proxy
keycloak-config-cli | vouch-proxy | |
---|---|---|
10 | 48 | |
672 | 2,650 | |
3.1% | 1.4% | |
8.1 | 3.2 | |
4 days ago | about 1 month ago | |
Java | Go | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
keycloak-config-cli
-
Beyond the login page
Most of the time nowadays, I prefer offloading this to an identity provider, using OpenID Connect or soon Federated Credential Management (FedCM), even if that means shipping an identity provider as part of the deliverables (I generally go with Keycloak, with keycloak-config-cli to provision its configuration). I'm obviously biased though as I work in IT services, developping software mainly for intranets/extranets, and companies now increasingly have their own identity providers or at a minimum have that in their roadmap. So YMMV.
-
Keycloak – Open-Source Identity and Access Management Interview
> But it is painful share the setup with other engineers.
We used keycloak-config-cli [1] it compares a config file stripped of IDs to your Keycloak installation and makes the relevant updates through the REST API.
[1] https://github.com/adorsys/keycloak-config-cli
- Keycloak with PostgreSQL on Kubernetes
-
Is Keycloak ready for Kubernetes?
As far as I know, the state of the art is https://github.com/adorsys/keycloak-config-cli , but I haven't played with that yet. It seems to be a big improvement over other solutions, because it can update configurations and the configurations can be "clean".
- Add keycloak configurations through script
-
Noob question about self-hosting on a VPS
One alternative is to use the admin APIs instead of the UI. You'd SSH into the host and then use curl or https://github.com/adorsys/keycloak-config-cli to configure keycloak. I use the keycloak-config-cli for my setup. It's both how I manage disaster recovery and make changes to configuration.
-
Keycloak; docker or dedicated?
I'm not saying that keycloak is always easy to work with. The thing I found hardest to figure out was how to automate disaster recovery. I want to be able to rebuild my entire auth configuration from scratch including users, default passwords, oauth clients, JWT mappings, etc. The only way I found to do this was to use https://github.com/adorsys/keycloak-config-cli. tl;dr It uses the admin API to provision items. You can export a configured realm, manually tweak some parts of it like enter passwords and add users, and then run it against a keycloak instance to restore everything.
-
Keycloak config management?
I've found this https://github.com/adorsys/keycloak-config-cli and it looks really promising. It can update the configs without a need to restart the whole keycloak instance.
-
Nginx auth_request and Keycloak?
If you do end up using a setup like this then I highly recommend that you look into https://github.com/adorsys/keycloak-config-cli. tl;dr You can export your realm configuration once set up and then use it to restore your system should you lose your keycloak data. It can also be used to provision users but you have to manually add them to the realm export because they are not included in an export for some reason. All the different objects it can manage are documented here: https://www.keycloak.org/docs-api/17.0/rest-api/index.html#_realmrepresentation.
vouch-proxy
- I'm looking for an SSO server/reverse proxy with features I'm not sure exist
-
Keycloak vs. Authentik vs. Authelia, help choose SSO
Look into vouch proxy
- Solf-hosted login form for self-hosted app ?
- AWS EKS front end authentication with Okta?
-
Is there something like Keycloak or Authelia that supports both forward auth and identity providers?
Vouch proxy is designed for this usage: https://github.com/vouch/vouch-proxy I don't think there are any nice UIs to configure it though so you'll need to be familiar with running it yourself.
-
cloudflare and ingress-nginx
Not sure this is a "best practice", but it lets me keep control of the Ingress resources inside their YAML configs. I've also layered Vouch Proxy into the ingress configurations to require SSO/MFA auth to access the resources behind the Ingress. Cloudflare has the ability to do this, but I found it cumbersome to keep track of the configs outside the K8s cluster.
-
Single Sign on for reverse proxy (NGINX Proxy Manager)
I've used vouch proxy for my own stuff previously, before more recently moving to Cloudflare Access. vouch can be slightly janky at times to get working right, but once set up, it's been solid.
-
Yubikey support in Jellyfin
For example: nginx -> Vouch proxy -> KeyCloak -> Jellyfin
-
Jump Host SSO to Internal Apps
While this works, we were hoping to make access a bit easier with say an OpenID Connect SSO and reverse-proxy solution. I've seen Vouch Proxy, https://github.com/vouch/vouch-proxy which is really just SSO on top of nginx, but I'm wondering if there's a simpler way to do this.
-
Do you prefer to build your own auth, or use some library or provider (like auth0, Next Auth, Supabase, etc)?
You seem to be quite knowledgeable and a minimal provider with just the bare minimum would suffice for you. Have a look at Vouch Proxy, it does one thing and it does it well.
What are some alternatives?
testcontainers-spring-boot - Container auto-configurations for Spring Boot based integration tests
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
nginx-openid-connect - Reference implementation of OpenID Connect integration for NGINX Plus
jfa-go - a better way to manage your Jellyfin users, now in go
private_server - This is the configuration for my private server, with the intention of never having to use manual SSH.
authentik - The authentication glue you need.
authelia - The Single Sign-On Multi-Factor portal for web apps
component-keycloak - Commodore Component for Keycloak
traefik-forward-auth - Minimal forward authentication service that provides Google/OpenID oauth based login and authentication for the traefik reverse proxy
terraform-provider-keycloak - Terraform provider for Keycloak
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface