openid

ballj/openid/keycloak

Terraform Module HCL KEYCLOAK

OpenID module for apps on Kubernetes.

Install
module "openid" {
source = "ballj/openid/keycloak"
version = "1.2.0"
}
plain text: /constructs/tfmod-ballj-openid-keycloak/install.txt
⭐ Source on GitHub 📦 Registry page
README

Terraform Keycloak OpenID This terraform module creates an OpenID client on keycloak. Useage `` module "openid" { source = "ballj/openid/keycloak" version = "~> 1.0" realm = "example.com" client_id = "https://application.example.com" name = "myapp" access_type = "CONFIDENTIAL" } ` Variables | Variable | Required | Default | Description | | -------------------------------------------- | -------- | ------------ | --------------------------------------------------- | | name | Yes | N/A | Display name of this client | | realm_id | Yes | N/A | Realm this client is attached to | | client_id | Yes | N/A | Client ID for this client | | description | No | null | The description of this client in the GUI | | enabled | No | true | Allow clients to initiate a login | | roles | No | [] | Roles to add t

Inputs (38)
NameTypeDescriptionDefault
namestringDisplay name of this client required
realmstringRealm this client is attached to required
client_idstringClient ID for this client required
access_typestringSpecifies the type of client [CONFIDENTIAL, PUBLIC, BEARER-ONLY] required
pkce_code_challenge_methodstringThe challenge method to use for Proof Key for Code Exchange""
client_offline_session_max_lifespannumberMax time before a client offline session is expirednull
client_session_max_lifespannumberMax time before a client session is expirednull
consent_requiredboolUsers have to consent to client accessfalse
backchannel_logout_urlstringURL that will cause the client to log itself outnull
enabledboolAllow clients to initiate a login or obtain access tokenstrue
full_scope_allowedboolAllow to include all roles mappings in the access tokenfalse
direct_access_grants_enabledboolOAuth2 Resource Owner Password Grant will be enabled for this clienttrue
service_account_enabledboolOAuth2 Client Credentials grant will be enabled for this clientfalse
client_offline_session_idle_timeoutnumberTime a client offline session is allowed to be idlenull
backchannel_logout_revoke_offline_sessionsboolSpecifying whether a revoke_offline_access event is included in the Logout Tokenfalse
keys_filter_statuslist(string)Keys will be filtered by status[ "ACTIVE" ]
secret_keystringKubernetes namespace to deploy into"client_secret"
descriptionstringThe description of this client in the GUInull
root_urlstringURL is prepended to any relative URLs foundnull
exclude_session_state_from_auth_responseboolParameter session_state will not be included in OpenID Connect Authentication Refalse
keys_filter_algorithmlist(string)Keys will be filtered by algorithm[]
valid_redirect_urislist(string)List of valid URIs a browser is permitted to redirect to after a successful loginull
use_refresh_tokensstringA refresh_token will be created and added to the token responsetrue
backchannel_logout_session_requiredboolA sid (session ID) claim will be included in the logout tokentrue
Outputs (5)
client_id
resource_id
client_secret
roles
realm_keys
Resources (8)
keycloak_group_roleskeycloak_openid_audience_protocol_mapperkeycloak_openid_clientkeycloak_openid_full_name_protocol_mapperkeycloak_openid_user_attribute_protocol_mapperkeycloak_openid_user_client_role_protocol_mapperkeycloak_openid_user_property_protocol_mapperkeycloak_role
Details
FrameworkTerraform Module
LanguageHCL
Version1.2.0
Cloud KEYCLOAK
★ Stars1
Forks0
Total downloads2.2k
Inputs38
Outputs5
Resources8
Namespaceballj
Updated