Skip to content

Commit

Permalink
Deploying to gh-pages from @ fa7f755 🚀
Browse files Browse the repository at this point in the history
  • Loading branch information
aolle committed Apr 23, 2024
1 parent 1c3f184 commit 6ba3c4e
Show file tree
Hide file tree
Showing 4 changed files with 18 additions and 18 deletions.
2 changes: 1 addition & 1 deletion index.html
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ <h3 class="title"><a href="index.html"></a></h3>
<a class="nav-link" href="openid-jwt.html#architecture">2.1. Architecture</a>
</li>
<li class="nav-item" data-depth="2">
<a class="nav-link" href="openid-jwt.html#rhbk">2.2. RHBK Configuration</a>
<a class="nav-link" href="openid-jwt.html#rhbk">2.2. RedHat Build of Keycloak Configuration</a>
</li>
<li class="nav-item" data-depth="2">
<a class="nav-link" href="openid-jwt.html#backend">2.3. Backend</a>
Expand Down
26 changes: 13 additions & 13 deletions openid-jwt.html
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ <h3 class="title"><a href="index.html"></a></h3>
<a class="nav-link" href="#architecture">2.1. Architecture</a>
</li>
<li class="nav-item" data-depth="2">
<a class="nav-link" href="#rhbk">2.2. RHBK Configuration</a>
<a class="nav-link" href="#rhbk">2.2. RedHat Build of Keycloak Configuration</a>
</li>
<li class="nav-item" data-depth="2">
<a class="nav-link" href="#backend">2.3. Backend</a>
Expand Down Expand Up @@ -125,15 +125,15 @@ <h1 class="page">OpenID + JWT</h1>
<p>This tutorial demonstrates how to implement an OpenID Connect flow with a JWT implementation.</p>
</div>
<div class="paragraph">
<p>We will set up a new realm in Red Hat Build for Keycloak (RHBK) and configure it. Subsequently, we will deploy the stack and configure user access, enabling roles for various operations.</p>
<p>We will set up a new realm in Red Hat Build for Keycloak and configure it. Subsequently, we will deploy the stack and configure user access, enabling roles for various operations.</p>
</div>
</div>
</div>
<div class="sect1">
<h2 id="architecture"><a class="anchor" href="#architecture"></a>Architecture</h2>
<div class="sectionbody">
<div class="paragraph">
<p>Firstly, we require an instance of RHBK to manage access across our applications. One advantage of implementing OpenID Connect with JWT is the seamless integration of various applications and frameworks, facilitated by libraries available for each.</p>
<p>Firstly, we require an instance of Red Hat Build for Keycloak to manage access across our applications. One advantage of implementing OpenID Connect with JWT is the seamless integration of various applications and frameworks, facilitated by libraries available for each.</p>
</div>
<div class="paragraph">
<p>In this instance, we will construct a comprehensive architecture involving several microservices. The frontend is developed in ReactJS, responsible for displaying the data.</p>
Expand All @@ -149,15 +149,15 @@ <h2 id="architecture"><a class="anchor" href="#architecture"></a>Architecture</h
</div>
</div>
<div class="sect1">
<h2 id="rhbk"><a class="anchor" href="#rhbk"></a>RHBK configuration</h2>
<h2 id="rhbk"><a class="anchor" href="#rhbk"></a>Red Hat Build for Keycloak configuration</h2>
<div class="sectionbody">
<div class="paragraph">
<p>This section outlines the process of creating a new realm using the OpenID Connect flow and provides guidance on its configuration.</p>
</div>
<div class="sect2">
<h3 id="_create_a_realm"><a class="anchor" href="#_create_a_realm"></a>Create a realm</h3>
<div class="paragraph">
<p>A realm in RHBK functions as a domain where clients, users, roles, etc., can be configured. In this example, we offer an import containing the configuration to execute this workshop. Nevertheless, we are creating one from scratch to illustrate all the processes:</p>
<p>A realm in Red Hat Build for Keycloak functions as a domain where clients, users, roles, etc., can be configured. In this example, we offer an import containing the configuration to execute this workshop. Nevertheless, we are creating one from scratch to illustrate all the processes:</p>
</div>
<div class="imageblock">
<div class="content">
Expand All @@ -168,7 +168,7 @@ <h3 id="_create_a_realm"><a class="anchor" href="#_create_a_realm"></a>Create a
<div class="sect2">
<h3 id="_create_a_client"><a class="anchor" href="#_create_a_client"></a>Create a client</h3>
<div class="paragraph">
<p>A client in RHBK serves as a consumer. Since we are employing an OpenID Connect flow, the selection of a standard or implicit flow depends on whether we are configuring a private or public client.</p>
<p>A client in Red Hat Build for Keycloak serves as a consumer. Since we are employing an OpenID Connect flow, the selection of a standard or implicit flow depends on whether we are configuring a private or public client.</p>
</div>
<div class="paragraph">
<p>To register a new client, navigate to the Keycloak admin console and access the client options. In this section, locate the "Create client" option.</p>
Expand Down Expand Up @@ -218,15 +218,15 @@ <h3 id="_find_the_backend_url"><a class="anchor" href="#_find_the_backend_url"><
</div>
</div>
<div class="sect2">
<h3 id="_rhbk_configuration"><a class="anchor" href="#_rhbk_configuration"></a>RHBK configuration</h3>
<h3 id="_red_hat_build_for_keycloak_configuration"><a class="anchor" href="#_red_hat_build_for_keycloak_configuration"></a>Red Hat Build for Keycloak configuration</h3>
<div class="paragraph">
<p>The Keycloak instance includes a realm that has been configured with a dedicated client tailored for this workshop.</p>
</div>
<div class="paragraph">
<p>This application functions as a backend service utilizing a standard flow with a private client. In the upcoming section, you will find all the necessary configurations.</p>
</div>
<div class="paragraph">
<p>If you want to review the OpenID Connect client configuration and explore the RHBK admin console, please navigate to the following section.</p>
<p>If you want to review the OpenID Connect client configuration and explore the Red Hat Build for Keycloak admin console, please navigate to the following section.</p>
</div>
<div class="imageblock">
<div class="content">
Expand All @@ -237,7 +237,7 @@ <h3 id="_rhbk_configuration"><a class="anchor" href="#_rhbk_configuration"></a>R
<div class="sect2">
<h3 id="_quarkus_configuration"><a class="anchor" href="#_quarkus_configuration"></a>Quarkus configuration</h3>
<div class="paragraph">
<p>Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with RHBK, since it follows the OpenID Connect protocol, we will utilize the <code>quarkus-oidc</code> generic library.</p>
<p>Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with Red Hat Build for Keycloak, since it follows the OpenID Connect protocol, we will utilize the <code>quarkus-oidc</code> generic library.</p>
</div>
<div class="listingblock lines_space console-input">
<div class="content">
Expand Down Expand Up @@ -301,7 +301,7 @@ <h4 id="_how_to_get_an_access_token"><a class="anchor" href="#_how_to_get_an_acc
<p>We will employ the <code>curl</code> bash client to test the remaining endpoints of the application. If you prefer a more visual approach, you can skip this section and proceed directly to the front-end application section.</p>
</div>
<div class="paragraph">
<p>To obtain an access token, we need to configure certain parameters that RHBK requires.</p>
<p>To obtain an access token, we need to configure certain parameters that Red Hat Build for Keycloak requires.</p>
</div>
<div class="admonitionblock note">
<table>
Expand Down Expand Up @@ -448,7 +448,7 @@ <h3 id="_find_the_front_end_application_url"><a class="anchor" href="#_find_the_
<div class="sect2">
<h3 id="_create_the_user"><a class="anchor" href="#_create_the_user"></a>Create the user</h3>
<div class="paragraph">
<p>The initial step is to create a new user to demonstrate the entire configuration step by step. To do this, enter the RHBK admin console, navigate to the "users" section, and click the "add user" button.</p>
<p>The initial step is to create a new user to demonstrate the entire configuration step by step. To do this, enter the Red Hat Build for Keycloak admin console, navigate to the "users" section, and click the "add user" button.</p>
</div>
<div class="imageblock">
<div class="content">
Expand Down Expand Up @@ -580,15 +580,15 @@ <h3 id="_add_roles_to_the_user"><a class="anchor" href="#_add_roles_to_the_user"
<p>At this point, we understand how the ReactJS security model relies on the user roles present in the JWT token.</p>
</div>
<div class="paragraph">
<p>Now, let&#8217;s proceed to add roles to users to enable private actions. The initial step is to return to the RHBK admin page and locate the user named <code>reader</code>. Once you have identified the user, navigate to the "Role mapping" tab.</p>
<p>Now, let&#8217;s proceed to add roles to users to enable private actions. The initial step is to return to the Red Hat Build for Keycloak admin page and locate the user named <code>reader</code>. Once you have identified the user, navigate to the "Role mapping" tab.</p>
</div>
<div class="imageblock">
<div class="content">
<img src="_images/openid/frontend-add-role-01.png" alt="frontend add role 01">
</div>
</div>
<div class="paragraph">
<p>After clicking the "Assign role" button, RHBK will display a list of all available roles in the system.</p>
<p>After clicking the "Assign role" button, Red Hat Build for Keycloak will display a list of all available roles in the system.</p>
</div>
<div class="paragraph">
<p>Select the role "padel-player" and click the "Assign" button.</p>
Expand Down
2 changes: 1 addition & 1 deletion setup.html
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ <h3 class="title"><a href="index.html"></a></h3>
<a class="nav-link" href="openid-jwt.html#architecture">2.1. Architecture</a>
</li>
<li class="nav-item" data-depth="2">
<a class="nav-link" href="openid-jwt.html#rhbk">2.2. RHBK Configuration</a>
<a class="nav-link" href="openid-jwt.html#rhbk">2.2. RedHat Build of Keycloak Configuration</a>
</li>
<li class="nav-item" data-depth="2">
<a class="nav-link" href="openid-jwt.html#backend">2.3. Backend</a>
Expand Down
6 changes: 3 additions & 3 deletions sitemap.xml
Original file line number Diff line number Diff line change
Expand Up @@ -2,14 +2,14 @@
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://olleb.com/rhbk-workshop/index.html</loc>
<lastmod>2024-01-31T00:05:37.477Z</lastmod>
<lastmod>2024-04-23T22:10:31.201Z</lastmod>
</url>
<url>
<loc>https://olleb.com/rhbk-workshop/openid-jwt.html</loc>
<lastmod>2024-01-31T00:05:37.477Z</lastmod>
<lastmod>2024-04-23T22:10:31.201Z</lastmod>
</url>
<url>
<loc>https://olleb.com/rhbk-workshop/setup.html</loc>
<lastmod>2024-01-31T00:05:37.477Z</lastmod>
<lastmod>2024-04-23T22:10:31.201Z</lastmod>
</url>
</urlset>

0 comments on commit 6ba3c4e

Please sign in to comment.