Skip to content

fix(keycloak): grant admin realm role to adm user#50

Open
abir-oumghar wants to merge 1 commit into
mainfrom
fix/issue-45-admin-role-for-adm
Open

fix(keycloak): grant admin realm role to adm user#50
abir-oumghar wants to merge 1 commit into
mainfrom
fix/issue-45-admin-role-for-adm

Conversation

@abir-oumghar
Copy link
Copy Markdown
Contributor

Closes #45.

The adm user (defined in clusters/sandbox/default-context.yaml) is the OIDC admin used to log into OKDP UI, Airflow, JupyterHub, Superset, and the other user-facing services. It only carried the custom admins realm role, so it could not log into the Keycloak admin console — that one requires the master realm's native admin role. The bootstrap superuser admin/admin was the only way in, which conflicted with the adm OIDC session and produced the auth/session loop described in the issue.

Adding the native admin role to adm lets a single account drive both the user-facing services and Keycloak administration. The change is purely additive: existing services that map roles do so on the admins group (Superset's AUTH_ROLES_MAPPING, JupyterHub's admin_groups, etc.), not on the native admin role, so nothing else is affected.

Verified locally on the kind sandbox by granting the role via kcadm.sh and logging into both the Keycloak admin console and OKDP UI as adm/adm without any session conflict.

Closes #45.

The 'adm' user authenticates OKDP services via OIDC but could not access
the Keycloak admin console because that requires the master realm's
native 'admin' role. Granting it to 'adm' lets a single account drive
both the user-facing services and Keycloak administration.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Admin username mismatch between OKDP UI (adm) and Keycloak (admin) causes session conflicts

1 participant