saml

ballj/saml/keycloak

Terraform Module HCL KEYCLOAK

SAML module

Install
module "saml" {
source = "ballj/saml/keycloak"
version = "1.2.0"
}
plain text: /constructs/tfmod-ballj-saml-keycloak/install.txt
⭐ Source on GitHub 📦 Registry page
README

Terraform Keycloak SAML This terraform module creates an SAML client on keycloak. Useage `` module "saml" { source = "ballj/saml/keycloak" version = "~> 1.0" realm = "example.com" entity_id = "https://myapp.example.com/saml" name = "myapp" } ` Variables | Variable | Required | Default | Description | | ------------------------------------- | -------- | ------------ | ---------------------------------------------------------------- | | name | No | null | Display name of this client | | realm_id | Yes | N/A | Realm this client is attached to | | entity_id | No | N/A | SP Entity ID | | description | No | null | The description of this client in the GUI | | enabled | No | true | Allow clients to initiate a login | | login_theme | No | null | Client login theme | | include_authn_statement | No

Inputs (37)
NameTypeDescriptionDefault
realmstringRealm this client is attached to required
descriptionstringThe description of this client in the GUInull
sign_assertionsboolSAML assertions will be signed by Keycloak using the realm's private keyfalse
force_post_bindingboolKeycloak will always respond to an authentication request via the SAML POST Bindtrue
valid_redirect_urislist(string)List of valid URIs a browser is permitted to redirect to after a successful loginull
full_scope_allowedboolAllow to include all roles mappings in the access tokenfalse
keys_filter_algorithmlist(string)Keys will be filtered by algorithm[]
sign_documentsboolSAML document will be signed by Keycloak using the realm's private keytrue
client_signature_requiredboolKeycloak will expect that documents originating from a client will be signedtrue
force_name_id_formatboolIgnore requested NameID subject format and used configured onefalse
canonicalization_methodstringThe Canonicalization Method for XML signatures"EXCLUSIVE"
keys_filter_statuslist(string)Keys will be filtered by status[ "ACTIVE" ]
user_property_protocol_mapperslist(any)User-property protocol mappers to add to client[]
enabledboolAllow clients to initiate a login or obtain access tokenstrue
login_themestringClient login themenull
front_channel_logoutboolClient will require a browser redirect in order to perform a logouttrue
signature_key_namestringValue of the KeyName element within the signed SAML document"KEY_ID"
base_urlstringDefault URL to use when the auth server needs to redirect or link back to the clnull
master_saml_processing_urlstringURL will be used for all SAML requestsnull
signing_private_keystringKey will be used to verify the documents or assertions from the clientnull
entity_idstringSP Entity ID""
Outputs (2)
roles
realm_keys
Resources (5)
keycloak_generic_client_protocol_mapperkeycloak_group_roleskeycloak_rolekeycloak_saml_clientkeycloak_saml_user_property_protocol_mapper
Details
FrameworkTerraform Module
LanguageHCL
Version1.2.0
Cloud KEYCLOAK
★ Stars2
Forks0
Total downloads938
Inputs37
Outputs2
Resources5
Namespaceballj
Updated