Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Published by Scroll Versions from space WADMINPAS and version 24.0

Accessing the Identity Management

Image Added

In our Scheer PAS platform, we use Keycloak as identity management tool.

You can access it via the corresponding tile in the Scheer PAS Portal .

Only users with profile keycloak_user are able to see the tile in the portal.

Image Added

If you click the identity management tile, the tool will open within the portal.

Keycloak: Managing Authentication

Image Modified

Scheer PAS uses Keycloak to save the platform users and their passwords. For API Management and Kibana we also manage roles in Keycloak.Keycloak is an identity and access management software that can manage users for multiple applications and enables them for sigle sign on. Data for each application is stored in so called realmsmanage Single Sign-on for the platform.


Image ModifiedImage Removed
Tip

In the Official Keycloak Documentation you will find detailed descriptions of all Keycloak functionalities. Please note that the official documentation may vary according to different versions of the tool.

Before consulting the documentation check your Keycloak version:

  • Open the user menu and chose option Server Info.
  • On page Server Info, check the entry in field Server Version.

Keycloak Roles for Usage with Scheer PAS

In Keycloak, you can assign two different types of roles:

Realm Roles

Realm roles are a global namespace to define your roles. The following realm roles are used with Scheer PAS:

Role NameDescription

apiadmin

Grants administrator privileges for API Management.apipublisherRequired to publish to the API gateway of API Management (applies to a technical user only).apiuserGrants user privileges for API Management.devportaluserRequired to access the developer portal of API Management.elasticadminGrants access to Elastisearch and Kibana.offline_access

Default Keycloak realm role.

Tip

See chapter Roles in the official Keycloak documentation.

uma_authorization

Default Keycloak realm role.

Tip

See chapter Roles in the official Keycloak documentation.

Client Roles

Client roles are namespaces dedicated to a client. To add a client role, you must first select the client from the drop-down list.

In case of Scheer PAS, the client realm-management is needed. This client defines client-level roles that specify permissions that can be granted to manage the realm.

ClientRole NameDescriptionrealm-managementview-usersUsers with this role will only be able to use that specific part of the administration console.

How to Create Additional Keycloak Admins

You can create additional admins for Keycloak as follows:

  1. Go to realm Master.
  2. Select Users.
  3. Create a new user or edit an existing user.
  4. Switch to tab Role Mappings.
  5. Assign role admin in section Realm Roles.

Keycloak and API Management

Scheer PAS API Management uses the Keycloak application to manage application access. Additionally, you can manage user roles in API Management to grant permissions within API Management.

Tip

Visit the API Management Guide for further informations. You will find a detailed description how Keycloak is used to manage API Management users on page Managing Users and Permissions.

Keycloak and Kibana

Kibana is delivered with every installation of Scheer PAS 20.1, including a Kibana admin user. Use this admin user to access Kibana.

Preview: Starting with PAS 21.1 you can assign the role elasticadmin to each PAS user individually. This role grants access to Kibana.

  • PAS Administration and search for Keycloak.
  • The version of the running Keycloak service is displayed in column Version.
Panel
titleOn this Page:

Table of Contents

Panel
titleRelated Pages:
Panel
titleRelated Documentation:

Otp
Floatingfalse
maxHLevel2

Rp
APIMGMNTManaging Users and Permissions
Rde

...