-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
add test frontend and automatic configuration
- Loading branch information
1 parent
fbf924c
commit e6875ce
Showing
32 changed files
with
23,088 additions
and
23 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
# Configuration of Keycloak | ||
## 1) Configure Keycloak to enable the eID provider | ||
Follow these steps to configure the eID identity provider for using the Proof-of-Concept. | ||
1. Go to `https://localhost:8443` and log in to the Keycloak Admin UI with `admin` as Username and Password. | ||
2. Go to identity providers and select eID. | ||
3. Set dummy values for Client Id and Client Secret. They are not necessary for a functioning eID identity provider but are required by the current [Keycloak implementation](https://github.com/keycloak/keycloak/issues/21891). | ||
4. Set the ID Panstar Server URL to `https://dev.id.governikus-eid.de/gov_autent/async`. | ||
5. Set the SAML Request Entity Base URL to `https://localhost:8443`. | ||
6. Set the keys and certificates stored at `src/main/resources/keys` in the order specified by their names. | ||
|
||
The final configuration looks like this. | ||
|
||
 | ||
|
||
Of course, in real world scenarios you'd need different eID servers and thus also different keys/certificates. | ||
|
||
## 2) Create the client to work with the test frontend | ||
1. Go to `https://localhost:8443` and log in to the Keycloak Admin UI with `admin` as Username and Password. | ||
2. Go to Clients | ||
3. Click "Create Client" | ||
3.1 *General Settings*: Set `eid-test-frontend` as the client id | ||
3.2 *Capability config*: no config needed, just click next | ||
3.3 *Login Settings* Set the Root URL to `http://localhost:4200` and the redirect URIs and web origins to `*` | ||
4. Click save |
Oops, something went wrong.