The user authentication is managed by the central keycloak instance managed by catena. You can configure your IDP there.
Here is a link on how to do that.
In the app module, there is a function which is executed during the app bootstrap. That function retrieves the realm provided in the environment variables, which is used to set up the Keycloak configurations.
{
provide: APP_INITIALIZER,
useFactory: keycloakInit,
multi: true,
deps: [KeycloakService],
}
keycloak.init({
config: {
url: environment.keycloakUrl,
realm: environment.realm,
clientId: environment.clientId,
},
initOptions: {
onLoad: 'login-required',
checkLoginIframe: false,
},
});
- Docker with docker-compose
Keycloak can be started through:
yarn env:mock
On the first Keycloak start it should be properly configured.
By default, it would be available at http://localhost:8080
To get to the configuration section please click on Administration Console.
Default user/password is admin
/admin
.
Now you can start the configuration.
Create a new Realm mock
and select one.
In Realm Settings
(from sidebar) -> Security Defenses
:
Clear X-Frame-Options
Set Content-Security-Policy
to frame-src 'self'; object-src 'none’;
In Clients
(from sidebar)
- Create a new client
catenax-portal
- Edit
catenax-portal
- Set
Valid Redirect URIs
to*
Web Origins
to*
- Set
In Roles
(from sidebar):
- Add next roles:
user
admin
supervisor
In Users (from sidebar):
- Create user
default-user
with email, first name and last name, then assign to ituser
role forcatenax-portal
client and set a password (disable temp password option) - Create user
default-admin
with email, first name and last name, then assign to itadmin
role forcatenax-portal
client and set a password (disable temp password option) - Create user
default-supervisor
with email, first name and last name, then assign to itsupervisor
role forcatenax-portal
client and set a password (disable temp password option)