Replies: 9 comments
-
Hi @andys448, Could you tell more about the case you want to handle? If I undersand correctly, Keycloak is not accessible for some participants in this case and they get |
Beta Was this translation helpful? Give feedback.
-
Hi Emrah! Almost correct, I would like login to KeyCloak at jitsi.company.com/auth (keycloak will be available here). Is it possible? keycloak does not have its own DNS entry in the external zone and is not available from internet. |
Beta Was this translation helpful? Give feedback.
-
So in some cases, Keycloak's address will be different for frontend and backend. I need to work on this a bit. I think it would be a good feature. |
Beta Was this translation helpful? Give feedback.
-
Hi @andys448, Looks like this is already available. There are two config parameters for Keycloak's address:
https://github.com/nordeck/jitsi-keycloak-adapter/blob/main/config.ts#L1-L5
So, you may set export const KEYCLOAK_ORIGIN = "https://jitsi.company.com/auth";
export const KEYCLOAK_ORIGIN_INTERNAL = "https://keycloak-internal.company.com" |
Beta Was this translation helpful? Give feedback.
-
Hi @emrahcom I tried this but without any luck When I set these two variables, during authorization and redirection to keycloak I end up in an endless loop, which at the end returns error 502. I don’t see any hits in the keycloak logs. I also trying set proxy_pass in meet.conf
It almost works. But here I get an error from keycloak that no cookies were found In my case, I want to proxy the connection to keycloak via an external jitsi address. |
Beta Was this translation helpful? Give feedback.
-
Hi @andys448, I did some tests. It didn't work completely but I made some progress. In my test environment:
I added two locations into Nginx config to use it as a reverse proxy for Keycloak:
And I updated export const KEYCLOAK_ORIGIN = "https://jitsi.mydomain.corp";
export const KEYCLOAK_ORIGIN_INTERNAL = "https://ucs-sso-ng.mydomain.corp"; The issue in this case, the ( |
Beta Was this translation helpful? Give feedback.
-
Many thanks for your reply! Yep, the same issue with keycloak address on final login page. |
Beta Was this translation helpful? Give feedback.
-
I don't know if there is a parameter for this on Keycloak side. You may update Keycloak response on the reverse proxy as a hacky solution. For example, the location should be like the following for my environment in this case:
apt-get install libnginx-mod-http-subs-filter |
Beta Was this translation helpful? Give feedback.
-
I'll try to check this. Many thanks!! |
Beta Was this translation helpful? Give feedback.
-
Hi!
first of all, adapter is awesome- it works great :)
Maybe it is possible to configure authorization if the keylock is not accessible to the external network? For example, using custom locations in meet.conf ?
Beta Was this translation helpful? Give feedback.
All reactions