Skip to content

Commit fa7f755

Browse files
committed
Replace RHBK
1 parent 739dcb4 commit fa7f755

File tree

2 files changed

+13
-13
lines changed

2 files changed

+13
-13
lines changed

documentation/modules/ROOT/nav.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
** xref:setup.adoc#deploy-ipa[1.3 Deploying an Identity Management (IdM/FreeIPA) on Red Hat OpenShift]
77
* xref:openid-jwt.adoc[2. OpenID Connect + JWT]
88
** xref:openid-jwt.adoc#architecture[2.1. Architecture]
9-
** xref:openid-jwt.adoc#rhbk[2.2. RHBK Configuration]
9+
** xref:openid-jwt.adoc#rhbk[2.2. RedHat Build of Keycloak Configuration]
1010
** xref:openid-jwt.adoc#backend[2.3. Backend]
1111
** xref:openid-jwt.adoc#frontend[2.4. Frontend]

documentation/modules/ROOT/pages/openid-jwt.adoc

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ include::_attributes.adoc[]
33

44
This tutorial demonstrates how to implement an OpenID Connect flow with a JWT implementation.
55

6-
We will set up a new realm in Red Hat Build for Keycloak (RHBK) and configure it. Subsequently, we will deploy the stack and configure user access, enabling roles for various operations.
6+
We will set up a new realm in Red Hat Build for Keycloak and configure it. Subsequently, we will deploy the stack and configure user access, enabling roles for various operations.
77

88
[#architecture]
99
== Architecture
1010

11-
Firstly, we require an instance of RHBK to manage access across our applications. One advantage of implementing OpenID Connect with JWT is the seamless integration of various applications and frameworks, facilitated by libraries available for each.
11+
Firstly, we require an instance of Red Hat Build for Keycloak to manage access across our applications. One advantage of implementing OpenID Connect with JWT is the seamless integration of various applications and frameworks, facilitated by libraries available for each.
1212

1313
In this instance, we will construct a comprehensive architecture involving several microservices. The frontend is developed in ReactJS, responsible for displaying the data.
1414

@@ -17,19 +17,19 @@ The user backend microservice, built with Quarkus, showcases a straightforward i
1717
image::openid/frontend-architecture-01.png[]
1818

1919
[#rhbk]
20-
== RHBK configuration
20+
== Red Hat Build for Keycloak configuration
2121

2222
This section outlines the process of creating a new realm using the OpenID Connect flow and provides guidance on its configuration.
2323

2424
=== Create a realm
2525

26-
A realm in RHBK functions as a domain where clients, users, roles, etc., can be configured. In this example, we offer an import containing the configuration to execute this workshop. Nevertheless, we are creating one from scratch to illustrate all the processes:
26+
A realm in Red Hat Build for Keycloak functions as a domain where clients, users, roles, etc., can be configured. In this example, we offer an import containing the configuration to execute this workshop. Nevertheless, we are creating one from scratch to illustrate all the processes:
2727

2828
image::openid/rhbk-create-realm-01.png[]
2929

3030
=== Create a client
3131

32-
A client in RHBK serves as a consumer. Since we are employing an OpenID Connect flow, the selection of a standard or implicit flow depends on whether we are configuring a private or public client.
32+
A client in Red Hat Build for Keycloak serves as a consumer. Since we are employing an OpenID Connect flow, the selection of a standard or implicit flow depends on whether we are configuring a private or public client.
3333

3434
To register a new client, navigate to the Keycloak admin console and access the client options. In this section, locate the "Create client" option.
3535

@@ -61,19 +61,19 @@ The front-end application consumes the back-end application, and it is crucial t
6161
oc get route -A | grep ms-users | awk '{print $3}'
6262
----
6363

64-
=== RHBK configuration
64+
=== Red Hat Build for Keycloak configuration
6565

6666
The Keycloak instance includes a realm that has been configured with a dedicated client tailored for this workshop.
6767

6868
This application functions as a backend service utilizing a standard flow with a private client. In the upcoming section, you will find all the necessary configurations.
6969

70-
If you want to review the OpenID Connect client configuration and explore the RHBK admin console, please navigate to the following section.
70+
If you want to review the OpenID Connect client configuration and explore the Red Hat Build for Keycloak admin console, please navigate to the following section.
7171

7272
image::openid/backend-rhbk-config-01.png[]
7373

7474
=== Quarkus configuration
7575

76-
Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with RHBK, since it follows the OpenID Connect protocol, we will utilize the `quarkus-oidc` generic library.
76+
Quarkus streamlines the security configuration in our backend services. To achieve this, we need to import the corresponding library. In this case, even though we are working with Red Hat Build for Keycloak, since it follows the OpenID Connect protocol, we will utilize the `quarkus-oidc` generic library.
7777

7878
[.lines_space]
7979
[.console-input]
@@ -121,7 +121,7 @@ The level of security required varies depending on the operation. In this case,
121121

122122
We will employ the `curl` bash client to test the remaining endpoints of the application. If you prefer a more visual approach, you can skip this section and proceed directly to the front-end application section.
123123

124-
To obtain an access token, we need to configure certain parameters that RHBK requires.
124+
To obtain an access token, we need to configure certain parameters that Red Hat Build for Keycloak requires.
125125

126126
[NOTE,subs="bash,+macros"]
127127
====
@@ -251,7 +251,7 @@ This message indicates that you have not logged into the application. So we have
251251

252252
=== Create the user
253253

254-
The initial step is to create a new user to demonstrate the entire configuration step by step. To do this, enter the RHBK admin console, navigate to the "users" section, and click the "add user" button.
254+
The initial step is to create a new user to demonstrate the entire configuration step by step. To do this, enter the Red Hat Build for Keycloak admin console, navigate to the "users" section, and click the "add user" button.
255255

256256
image::openid/frontend-create-user-01.png[]
257257

@@ -334,11 +334,11 @@ image::openid/frontend-login-03.png[]
334334

335335
At this point, we understand how the ReactJS security model relies on the user roles present in the JWT token.
336336

337-
Now, let's proceed to add roles to users to enable private actions. The initial step is to return to the RHBK admin page and locate the user named `reader`. Once you have identified the user, navigate to the "Role mapping" tab.
337+
Now, let's proceed to add roles to users to enable private actions. The initial step is to return to the Red Hat Build for Keycloak admin page and locate the user named `reader`. Once you have identified the user, navigate to the "Role mapping" tab.
338338

339339
image::openid/frontend-add-role-01.png[]
340340

341-
After clicking the "Assign role" button, RHBK will display a list of all available roles in the system.
341+
After clicking the "Assign role" button, Red Hat Build for Keycloak will display a list of all available roles in the system.
342342

343343
Select the role "padel-player" and click the "Assign" button.
344344

0 commit comments

Comments
 (0)