-
Notifications
You must be signed in to change notification settings - Fork 279
SAML support? #2729
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I suspect the right way to do this is definitely to configure Keycloak to delegate/federate to your corporate security solution. What do you currently use for corporate auth? It's possible keycloak already supports it. Or you could configure keycloak to use LDAP or Active Directory if either of those is used as the user store. If you provide a bit more context I could look into this with the keycloak team. |
We're using okta - https://www.okta.com/ leveraging SAML - which syncs with the corp directory (how I am not sure). Almost all of our corp apps are SAML based with Okta. This seems pretty typical for most corporations these days with Okta, ping and other solutions out there. |
OK thanks - I know that Keycloak has a ton of federation options. I'm not a KC expert but I'll see what I can find out. |
In the meantime, I did find this that might be exactly what you want: |
Cool I'll take a look. Meanwhile If you need anything else let me know. Happy to test this out more. I have tomcat -> okta working with opensaml but the jboss setup seems to have different security in it and overall the tool appears designed to work against keycloak so I tried to keep that path. |
Unfortunately yeah - Apicurio has a pretty firm requirement on Keycloak right now. With a small amount of coding I could support other Auth mechanisms easily enough, but the Linked Accounts feature really does require a backing feature of Keycloak to work. Without KC, the linked accounts stuff would need a lot of OpenID Connect type stuff to work - which I'd rather avoid. |
Makes sense to use it. For enterprises the linked accounts are useful, but even then maybe complex as we have SAML SSO for git as well. Hopefully can figure that out after corp login :) Thanks for quick feedback. The app is really useful. My okta admin and I will give the above a try tomorrow. |
I haven't heard back from the KC guys yet - did you make any progress on this? |
Looks like we got it to work. Still need to get this up correctly as its a temp server and not fully tested yet but we're able to put keycloak in between okta and first tests look good. |
Thanks for the update! If you get everything working it'd be great to have an article written about the configuration if you're willing to do that. |
Hi can I know how to get work apicurio with OKTA ? I think we can use both SAML / OpenID to connect apps for okta |
We were able to integrate Keycloak with a SAML backend "Identity Provider", with this as a starting point: Had to add some attribute mapping to get autoprovisioning (first name, last name, email) going, but otherwise seems to work (superficially, in our P.O.C.). |
@atz |
I suspect that everyone who got it working didn't write up instructions for it. Would still be very happy to have an article contributed for this config! |
I'm working in a company that already has a VERY large standardized SSO installation. I'm trying to get the registry stood up, but the lack of a readily/easily pluggable SSO provider capability that would allow the registry to readily leverage an existing provider is an utter show-stopper. Without going into the rabbit hole discussion of hard coding to a single provider, the above link to keycloak as a "starting point" is now broken, and I fail to locate any reference to configuring external SAML providers in the current KC docs (buried too deeply?). Are there any updated pointers/docs on this because I truly like the capabilities in this product. The lack of pluggable SSO adaptability is likely a coffin nail for every single medium to large enterprise as they already have a mature SSO functionality which their Security team has standards built upon. |
@jadedfire You mention Registry although this issue is for Apicurio Studio. Can you confirm? @carlesarnal Can you add any insight into the current status of non-Keycloak SSO support in registry? |
If this issue is for Registry, we might be ready to add that capability this month, so please, if you can confirm that point that would be awesome. |
@EricWittmann @carlesarnal I am not sure the appropriate answer for this. We are looking at the open source version of Apicurio and trying to stand up a POC that works in conjunction with our enterprise. That said, we hit the issue of tying the product into our in-house SSO provider so I began searching online for resources which landed me here on this issue. What is the difference between Studio and registry? |
Apicurio is a community with multiple projects: https://www.apicur.io/ Apicurio Studio is an API designer and Apicurio Registry provides a runtime registry of API Designs and Schemas, often used with Kafka applications as a runtime registry of Avro schemas (for example). So we're wondering which project you're trying to get working with your SSO. |
Honestly, I would think anything needing authentication for access. Thus, the web UI as well as any service endpoints. |
@carlesarnal I see issue number 743 on the registry repo, but it appears closed some time back. Based on your note above, it appears that generic support for any (standards based) SSO provider may be ready this month, and that would be great for our POC and adoption. If Studio is the designer for APIs that results in the artifacts that are then used to deploy to the registry, then it follows to me that it too would move in that direction since a company would likely leverage both as parts of an overall development and operational function, yes? |
@jadedfire our current issue is really the UI more than the endpoints. The latter should be configurable to use any openid-connect provider (@carlesarnal can confirm). However we're using |
@jadedfire that support is ready, but the issue you're mentioning, as you said, lives in Registry, so I'm wondering which project are you trying to use. |
@carlesarnal registry currently, but success on that front would expect to translate into leveraging other projects within the umbrella :) |
Ok, that's what I though, I will transfer this issue to the proper project and we can continue the discussion there. |
Thank you for reporting an issue! Pinging @EricWittmann to respond or triage. |
Closing as this has been implemented and the Registry standalone UI now supports using any other OIDC server. |
Has anyone managed to get their own setup working against corporate security with SAML? We're trying to have SAML for all applications and have an in house version of apicurio for our development teams to use.
I attempted to wire the code directly to SAML and bypass keycloak but was unable to figure out how JBOSS security is wired up in this area as its inside the server and no matter how many google searches I took no luck finding anyone else doing this either.
Seeing the code is setup for Keycloak now wondering if keycloak can use saml as an identify provider but maybe someone else has done this before.
The text was updated successfully, but these errors were encountered: