App to administrate users based on a central KEYCLOAK server (v.17.0). Case study to learn more about the interaction between KEYCLOAK, ANGULAR and SPRING BOOT security.
- Install Keycloak v17.0
- Add realm 'user-admin-app'
- Create client 'user-admin-frontend'
- Enabled: On
- Client protocol: openid-connect
- Access Type: public
- Standard workflow enabled: On
- Direct Access Grants Enabled: On
- Root URL: http://localhost:4200
- Valid Redirect URIs: http://localhost:4200/*
- Admin URL: http://localhost:4200
- Web Origins: http://localhost:4200
- Create client 'user-admin-backend'
- Enabled: On
- Client protocol: openid-connect
- Access Type: bearer-only
- Add role user-admin-user and user-admin-admin
- Create client '__user-admin-backend-admin'
- Enabled: On
- Client protocol: openid-connect
- Access Type: confidential
- Standard workflow enabled: On
- Direct Access Grants Enabled: On
- Root URL: http://localhost:9090
- Valid Redirect URIs: http://localhost:9090/*
- Admin URL: http://localhost:9090
- Web Origins: http://localhost:9090
- Generate Secret in Credentials tab
- Create at least one user with all realm management, user-admin-user and user-admin-admin permissions
- Used by application: Username: user2, Password: password