Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/revolunet/oauth2-proxy-keycloak-demo
Sample setup for oauth2-proxy + keycloak
https://github.com/revolunet/oauth2-proxy-keycloak-demo
docker-compose keycloak oauth2
Last synced: about 2 months ago
JSON representation
Sample setup for oauth2-proxy + keycloak
- Host: GitHub
- URL: https://github.com/revolunet/oauth2-proxy-keycloak-demo
- Owner: revolunet
- Created: 2023-03-01T08:00:53.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2024-09-04T08:22:41.000Z (4 months ago)
- Last Synced: 2024-11-02T14:51:47.377Z (2 months ago)
- Topics: docker-compose, keycloak, oauth2
- Homepage:
- Size: 16.9 MB
- Stars: 4
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# oauth2-proxy-keycloak-demo
This docker-compose setup demonstrates how to protect some web service behind an [oauth2-proxy](https://github.com/oauth2-proxy/oauth2-proxy) + [keycloak](https://www.keycloak.org/) authentification.
[![](./diagram.jpg)](https://developer.okta.com/blog/2022/07/14/add-auth-to-any-app-with-oauth2-proxy)
## Local dev setup
- Add `127.0.0.1 keycloak` and `127.0.0.1 proxy` to your `/etc/hosts`. this is necessary for the keycloak redirection
- Run `docker-compose up`
- Login to keycloak at `http://keycloak:8080` as `admin/admin` and create a new user in the `app-realm` realm, and check its "verified email" status.
- Now try to login with your new user via http://127.0.0.1:3000## Tips
- To signout from the target app, call `/oauth2/sign_out`