Using Keycloak (LDAP, OpenID and more)
Use Keycloak with Twake

Run keycloak and persist data

1
cd twake
2
docker run -p 8080:8080 -e KEYCLOAK_USER=admin -e KEYCLOAK_PASSWORD=admin -v $(pwd)/docker-data/keycloak-db:/opt/jboss/keycloak/standalone/data jboss/keycloak
Copied!

Configure keycloak with twake for the first time

On Keycloak
Go to http://localhost:8080/auth/
Login with admin:admin
Go to client > account > Credentials tab and save the Secret
Go to Settings tab and add a Valid Redirect uri to http://localhost:8000/* and save
Then create an user in User / Add User
⚠️ Users must have an email and the email must be marked as verified !
Then create a password for this user.
On Twake
Go to your [docker-compose file location]/configuration/backend/Parameters.php (see Configuration)
Change defaults.auth.openid to:
1
"use" => true,
2
"provider_uri" => 'http://[machine_ip]:8080/auth/realms/master',
3
"client_id" => 'account',
4
"client_secret" => '[keycloak_secret]',
5
"logout_suffix" => "/protocol/openid-connect/logout" //Specific to keycloak
Copied!
ℹ️ [machine_ip] Because Twake is accessing keycloak for inside a docker container, do not use localhost or 127.0.0.1 to access keycloak.
Copy link
Contents