forked from nebari-dev/nebari
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* keycloak helm overrides, fix yamlify * no default keycloak theme on clients [skip ci] * simplify qhub init and deploy docs * keycloak login docs * config examples * gitlab docs
- Loading branch information
Showing
21 changed files
with
344 additions
and
193 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,6 +6,7 @@ | |
installation.md | ||
setup.md | ||
usage.md | ||
login.md | ||
configuration.md | ||
management.md | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,93 @@ | ||
# Login | ||
|
||
Keycloak is the name of the open source user management software that is automatically deployed within QHub. It is used to store the database of all users in your QHub site, and can provide connectivity to other services such GitHub/Auth0 single-sign on. | ||
|
||
If you ran `qhub init` to create your `qhub-config.yaml` configuration file in the [Usage](usage.md) step, you will have been provided with a | ||
"random password for Keycloak root user". | ||
|
||
The password will also be visible in the `qhub-config.yaml` file under the security.keycloak.initial_root_password field. | ||
|
||
Note that when your QHub is first deployed, the password given at that location will be set for the root Keycloak user. If added or changed for subsequent deployments, that password value will have no effect. | ||
|
||
Please note the root Keycloak user is only able to login and manage the Keycloak identity management section of QHub. It is not a user of the wider QHub data science platform. | ||
|
||
## Adding a QHub user | ||
|
||
You will need to add a QHub user in order to login to your QHub platform. If you have chosen to use GitHub or Auth0 single-sign on, you must ensure the usernames you provide for new users in Keycloak match the usernames from GitHub/Auth0. | ||
|
||
### Add user from command line | ||
|
||
To make adding users easier for new QHub deployments, there is a QHub command that can help. It will only work if the initial_root_password for Keycloak has not yet been changed, so the value available in `qhub-config.yaml` is still correct. | ||
|
||
Run: | ||
``` | ||
qhub keycloak -c qhub-config.yaml adduser bob pa55w0rd | ||
``` | ||
|
||
This will create a user called bob with the initial password provided. Omit the password completely if you are using GitHub or Auth0. | ||
|
||
### Add user using Keycloak console | ||
|
||
To add a QHub user from the web console for Keycloak, visit: | ||
|
||
https://myqhubsite.com/auth/admin/ | ||
|
||
(Switch 'myqhubsite.com' for the domain you provided for your QHub deployment.) | ||
|
||
 | ||
|
||
Login using the username `root` and the password provided for the initial Keycloak root password. | ||
|
||
All QHub users will be part of the `qhub` realm (a realm is a distinct identity provider and set of users in Keycloak). Note that the root user alone is a member of the `master` realm. | ||
|
||
The qhub realm should be selected by default. | ||
|
||
Click 'Users' along the left-hand side of the page. | ||
|
||
Click the 'Add user' button and you will see the new user form: | ||
|
||
 | ||
|
||
Enter the name you would like for the user then click Save. | ||
|
||
Once the user has been created, you can set a password (not needed for GitHub/Auth0 login): | ||
|
||
 | ||
|
||
It is best to unset the 'Temporary' on/off button so the user won't be forced to change the password on first login. | ||
|
||
## Login to QHub | ||
|
||
Your new user can now log into QHub proper (not Keycloak's admin console). | ||
|
||
Visit https://myqhubsite.com/ (or whatever domain you have chosen for your QHub). | ||
|
||
Click 'Sign in with Keycloak'. | ||
|
||
 | ||
|
||
Enter the username and password you chose when you added a user to QHub above. | ||
|
||
If you chose GitHub or Auth0 login, click the 'GitHub' button to be taken to a GitHub login page and single-sign on from there. | ||
|
||
# Change Keycloak root password | ||
|
||
You should change your root password for Keycloak now that you've got things running. | ||
|
||
Back in https://myqhubsite.com/auth/admin/ you can click on the 'Root' dropdown in the top right of the screen, and select 'Manage account'. | ||
|
||
Under 'Account Security' click 'Signing In'. | ||
|
||
In the Password box, click the 'Update' button. This will guide you through entering your existing root password, and then entering a new password. | ||
|
||
From this point, the security.keycloak.initial_root_password field in `qhub-config.yaml` has no effect. If you redeploy QHub it will not reset the password back to the old one (or anything else that might be in the field in your YAML file). You can delete that line from your YAML file if you wish. | ||
|
||
# Groups | ||
|
||
Add Groups in the same Keycloak backend as you can add users - that is, login as `root` to https://myqhubsite.com/auth/admin/. Click Groups on the left-hand side. | ||
|
||
Groups named `users` and `admin` will have been created automatically by QHub. All users will be added to the `users` group automatically when you create them. You should never remove them from the `users` group as that group must contain all users. | ||
|
||
Members of `admin` group will have access to admin features within QHub. | ||
|
||
Neither `users` nor `admin` groups should ever be deleted. |
Oops, something went wrong.