Skip to content

Conversation

@geka-evk
Copy link

@geka-evk geka-evk commented Sep 25, 2023

We need to use Keycloak to authenticate users to follow OAuth 2.0 authorization code flow for MCM layer (hub operator)

Env variables:

  • AUTH_ENABLED is disabled by default (previous auth flow)
  • UI_OIDC_LOGIN_REDIRECT_URL - URL to redirect user to provide creds and grand permissions (Keycloack)
  • OIDC_TOKEN_PROVIDER_URL - URL to exchange authorization code for access token (providing also client ID and secret)
  • OIDC_CLIENT_ID - MCM portal OIDC client id (in Keycloak)
  • OIDC_CLIENT_SECRET - MCM portal OIDC client secret (in Keycloak)

@kleyow
Copy link
Contributor

kleyow commented Sep 26, 2023

lgtm so far, fix checks and I can approve.

was there some reason we couldn't of used some library for this?

kleyow
kleyow previously approved these changes Sep 26, 2023
@kleyow kleyow changed the title feat/IPROD-189-3 used Keycloak to perform /login action to do OAuth 2.0 authorization code flow feat(IPROD-189-3): used Keycloak to perform /login action to do OAuth 2.0 authorization code flow Sep 26, 2023
Copy link
Member

@mdebarros mdebarros left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just some suggested wording changes.

Please let me know if you agree with the changes.

Co-authored-by: Miguel de Barros <[email protected]>
Co-authored-by: Miguel de Barros <[email protected]>
Copy link
Member

@mdebarros mdebarros left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants