Skip to content
This repository has been archived by the owner on Mar 13, 2019. It is now read-only.

OpenIotNetwork/IAMServer

Repository files navigation

IAMServer

Identity and Access Server using Keycloak

Keycloak 2.4.0.Final - docker and docker-compose

This is docker-compose setup for Keycloak server configured with [mysql database) with nginx https termination and lightweight mail server.

Used docker images

Usage

  • Clone this repository and run docker-compose up
  • In separate shell, run ./add-cert-to-java-truststore.sh. Fix script for your local java setup, idea is to put custom (self-signed) certificate into java cacerts
  • Add to your /etc/hosts file record for identity.keycloak.openiot referencing 127.0.0.1
    • 127.0.0.1 identity.keycloak.openiot

Testing

Admin account

  • default admin account added to Keycloak is:
    • Username: openiot
    • Password: password

Modifications on Keycloak configuration

  • in standalone.xml, I've modified 2 lines:
    • line 410: <http-listener name="default" socket-binding="http" redirect-socket="https" proxy-address-forwarding="true"/>
      • This modification tells Keycloak to pull the client’s IP address from the X-Forwarded-For header since it's behind nginx.
    • line 412: <host name="default-host" alias="localhost" default-web-module="keycloak-server.war">
      • This modification deploys Keycloak as default application on root path (context)

About

Identity and Access Server using Keycloak

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages