-
Notifications
You must be signed in to change notification settings - Fork 25
Docker compose refinement #370
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
344ac1c
0e66e84
2198e08
fb5bd77
08ac1fd
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,4 @@ | ||
| { | ||
| "label": "Docker-Compose", | ||
| "position": 1 | ||
| } |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,90 @@ | ||
| --- | ||
| sidebar_position: 4 | ||
| id: keycloak | ||
| title: Keycloak | ||
| description: 'OpenCloud with Keycloak.' | ||
| draft: true | ||
| --- | ||
|
|
||
| ## Enable Keycloak Integration (optional) | ||
|
|
||
| <br/> | ||
|
|
||
| ### To enable Keycloak for identity and access management, **uncomment** the following lines in your `.env` file | ||
|
|
||
| ```env | ||
| LDAP=:ldap.yml | ||
| LDAP_MANAGER_DOMAIN=ldap.your.domain | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. LDAP_MANAGER should not be deployed. Only a testing tool.
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The keycloak part was before in the docker compose and was only copied here and we will rewrite it in a separate branch |
||
| LDAP_ADMIN_PASSWORD="your.save.password" | ||
| KEYCLOAK=:keycloak.yml | ||
| KEYCLOAK_DOMAIN=keycloak.your.domain | ||
| KEYCLOAK_ADMIN_USER="your.username" | ||
| KEYCLOAK_ADMIN_PASSWORD="your.save.password" | ||
| ``` | ||
|
|
||
| This will include the LDAP and Keycloak service definitions in the Docker Compose setup. | ||
|
|
||
| ### After starting OpenCloud, Keycloak will be available at | ||
|
|
||
| ```bash | ||
| https://keycloak.your.domain | ||
| ``` | ||
|
|
||
| ## 👤 Initial User Setup in Keycloak | ||
|
|
||
| ### Once Keycloak is running | ||
|
|
||
| - 1. Open your browser and go to | ||
|
|
||
| ```bash | ||
| https://keycloak.your.domain | ||
| ``` | ||
|
|
||
| <img src={require("./../../img/docker-compose/keycloak-dashboard.png").default} alt="Keyclosk dashboard" width="1920"/> | ||
| <br/><br/> | ||
|
|
||
| - 2. Log in with the admin credentials (default is admin / admin). | ||
| <img src={require("./../../img/docker-compose/keycloak-login.png").default} alt="Keycloak login" width="1920"/> | ||
| <br/><br/> | ||
|
|
||
| - 3. In the top-left dropdown (labeled Keycloak), switch to the OpenCloud realm. | ||
| <img src={require("./../../img/docker-compose/top-left-dropdown.png").default} alt="Top left dropdown menue" width="400"/> | ||
| <br/><br/> | ||
|
|
||
| - 4. Navigate to the "Users" section and click "Add user": | ||
| <img src={require("./../../img/docker-compose/users-section.png").default} alt="User section" width="1920"/> | ||
| <br/> | ||
|
|
||
| - Fill in a username | ||
| - Optionally add email, first/last name | ||
| - Click "Create" | ||
| <img src={require("./../../img/docker-compose/fill-in-userdata.png").default} alt="Fill in userdata" width="1920"/> | ||
| <br/><br/> | ||
|
|
||
| - 5. Go to the "Credentials" tab: | ||
|
|
||
| - Click "Set password" | ||
| <img src={require("./../../img/docker-compose/credentials.png").default} alt="Credentials" width="1920"/> | ||
| <br/> | ||
| - Set a temporary password | ||
| - Enable "Temporary" to force password change on first login (optional) | ||
| - Click "Save" | ||
| <img src={require("./../../img/docker-compose/set-password.png").default} alt="Set password" width="400"/> | ||
| <br/><br/> | ||
|
|
||
| - 6. Go to the "Role Mapping" tab: | ||
| <img src={require("./../../img/docker-compose/role-mapping.png").default} alt="Role mapping" width="1920"/> | ||
| <br/> | ||
|
|
||
| - Click "Assign role" | ||
| <img src={require("./../../img/docker-compose/assign-role.png").default} alt="Assign role" width="1920"/> | ||
| <br/> | ||
| - In the dialog, click "Filter by realm roles" | ||
| <img src={require("./../../img/docker-compose/filter-by-realm-roles.png").default} alt="Filter by realm roles" width="1920"/> | ||
| <br/> | ||
| - Choose the appropriate role (e.g., user, admin, etc.) | ||
| - Click "Assign" | ||
| <img src={require("./../../img/docker-compose/realm-roles.png").default} alt="Realm roles" width="1920"/> | ||
| <br/> | ||
|
|
||
| - The user can now log in via OpenCloud using the Keycloak credentials. | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is from the opencloud full example. Please adapt to use COMPOSE_FILE=
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The keycloak part was before in the docker compose and was only copied here and we will rewrite it in a separate branch