Integrating an Identity Provider
For authentication purposes, identity providers like Keycloak and Azure AD/Entra ID can be connected to yuuvis® RAD gateway using OpenID Connect/OAuth2.
When yuuvis® RAD service-manager is installed, the profile files gateway-azure.yml and gateway-keycloak.yml are installed in the \config directory.
These profiles must be configured for the corresponding integration and integrated via the servicewatcher-sw.yml file.
You need to restart yuuvis® RAD gateway after configuring and integrating the profiles.
The Change password function is not available when integrating an identity provider in yuuvis® RAD client.
Profile Files
You need the corresponding configurations of the identity providers in order to configure the profiles. In particular, you need a client ID and client secret to access the identity providers.
OAuth2 authentication is activated in the profile files via the authentication.filter.oauth2 parameter.
Azure AD/Entra ID
spring:
security:
oauth2:
resourceserver:
jwt:
user-name-attribute: name
issuer-uri: https://login.microsoftonline.com/<tenant-ID>/v2.0
client:
registration:
azure:
provider: azure
client-id: <client-ID>
client-secret: <client secret>
scope:
- openid
- email
provider:
azure:
issuer-uri: ${spring.security.oauth2.resourceserver.jwt.issuer-uri}
user-name-attribute: ${spring.security.oauth2.resourceserver.jwt.user-name-attribute}
See the developer documentation for information on configuring Azure AD/Entra ID.
Keycloak
spring:
security:
oauth2:
resourceserver:
jwt:
user-name-attribute: name
issuer-uri: http://<host>:<port>/realms/<realm>
client:
registration:
keycloak:
provider: keycloak
client-id: <client-ID>
client-secret: <client-secret>
scope:
- openid
- email
provider:
keycloak:
issuer-uri: ${spring.security.oauth2.resourceserver.jwt.issuer-uri}
user-name-attribute: ${spring.security.oauth2.resourceserver.jwt.user-name-attribute}
Integration of the Profiles
Profiles are assigned to the 'gateway' service via the profiles parameter in the servicewatcher-sw.yml file.
Add the correspondingly configured profile to the list of assigned profiles at the last position.
Example:
- name: gateway
type: microservice
profiles: prod,cloud,red,azure
instances: 1
memory: 256M
port: 80
path: ${appBase}/gateway/gateway-app.jar
Configuration for yuuvis® RAD agent
If yuuvis® RAD agent is used in environments with Identity Provider and OpenID Connect/OAuth2, installation requires that you make a corresponding entry in the connections.json configuration file and set up an additional configuration file that provides connection data to the Identity Provider.
areas. Use the toolbar to show all hidden areas at once:
