Integrating an Identity Provider
For authentication purposes, identity providers like Keycloak and Azure AD/Entra ID can be connected to yuuvis® RAD gateway using OpenID Connect/OAuth2.
When yuuvis® RAD service-manager is installed, the profile files gateway-azure.yml and gateway-keycloak.yml are installed in the \config directory.
These profiles must be configured for the corresponding integration and integrated via the servicewatcher-sw.yml file.
You need to restart yuuvis® RAD gateway after configuring and integrating the profiles.
The Change password function is not available when integrating an identity provider in yuuvis® RAD client.
Profile Files
You need the corresponding configurations of the identity providers in order to configure the profiles. In particular, you need a client ID and client secret to access the identity providers.
OAuth2 authentication is activated in the profile files via the authentication.filter.oauth2 parameter.
Azure AD/Entra ID
spring:
security:
oauth2:
resourceserver:
jwt:
user-name-attribute: name
issuer-uri: https://login.microsoftonline.com/<tenant-ID>/v2.0
client:
registration:
azure:
provider: azure
client-id: <client-ID>
client-secret: <client secret>
scope:
- openid
- email
provider:
azure:
issuer-uri: ${spring.security.oauth2.resourceserver.jwt.issuer-uri}
user-name-attribute: ${spring.security.oauth2.resourceserver.jwt.user-name-attribute}
See the developer documentation for information on configuring Azure AD/Entra ID.
Keycloak
spring:
security:
oauth2:
resourceserver:
jwt:
user-name-attribute: name
issuer-uri: http://<host>:<port>/realms/<realm>
client:
registration:
keycloak:
provider: keycloak
client-id: <client-ID>
client-secret: <client-secret>
scope:
- openid
- email
provider:
keycloak:
issuer-uri: ${spring.security.oauth2.resourceserver.jwt.issuer-uri}
user-name-attribute: ${spring.security.oauth2.resourceserver.jwt.user-name-attribute}
Integration of the Profiles
Profiles are assigned to the 'gateway' service via the profiles parameter in the servicewatcher-sw.yml file.
Add the correspondingly configured profile to the list of assigned profiles at the last position.
Example:
- name: gateway
type: microservice
profiles: prod,cloud,red,azure
instances: 1
memory: 256M
port: 80
path: ${appBase}/gateway/gateway-app.jar
Configuration for yuuvis® RAD agent
If yuuvis® RAD agent is used in environments with Identity Provider and OpenID Connect/OAuth2, installation requires that you make a corresponding entry in the connections.json
configuration file and set up an additional configuration file that provides connection data to the Identity Provider.