Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OAuth2 configuration with Keycloak #32

Open
olivierBlanc opened this issue Apr 27, 2021 · 5 comments
Open

OAuth2 configuration with Keycloak #32

olivierBlanc opened this issue Apr 27, 2021 · 5 comments

Comments

@olivierBlanc
Copy link

I would like to integrate Keycloak authentification in Kanboard.
But I cannot figure out the steps to configure both Keycloak and Kanboard OAuth2 plugin.
Does anyone has documentation on that ?

Configuration

  • Plugin version: 2f20dfe
  • Kanboard version: v1.2.19
  • Database type and version: postgres 11.11
  • PHP version: 7.4.15
  • OS: Linux / Docker
  • Browser: Brave
@jrb0001
Copy link

jrb0001 commented May 16, 2021

Keycloak->Client->Settings:

Client ID: <any value, copy for kanboard>
Enabled: checked
Client Protocol: openid-connect
Access Type: confidential
Valid Redirect URIs: https://<kanboard>/oauth/callback
Base URL: https://<kanboard>/
Admin URL: https://<kanboard>/
Web Origins: https://<kanboard>/

Keycloak->Client->Credentials:

Client Authenticator: Client Id and Secret
Secret: <generated, copy for kanboard>

Keycloak->Client->Client Scopes:

Default Client Scopes: email profile

Keycloak->Client->Scope Mappings:

Full Scope Allowed: unchecked

Kanboard:

Callback URL: https://<kanboard>/oauth/callback
Client ID: <as defined in keycloak>
Client Secret: <as defined in keycloak>
Authorize URL: https://<keycloak>/realms/<realm>/protocol/openid-connect/auth
Token URL: https://<keycloak>/realms/<realm>/protocol/openid-connect/token
User API URL: https://<keycloak>/realms/<realm>protocol/openid-connect/userinfo
Scopes: openid profile email
Username Key: preferred_username
Name Key: name
Email Key: email
User ID Key: sub

@luismanson
Copy link

luismanson commented Jul 6, 2021

It works for me. Thanks!

@Cyphers171
Copy link

Sorry to hijack the issue, but I was able to configure oatuh with keycloak, but I cannot use the field group filter with a wildcard, like group-*. Theres a way to use wildcard?

If necessary I open another issue.

Thanks in advance

@babvin
Copy link

babvin commented Aug 29, 2024

image
After providing the right username and password from keycloak login page still error is shown on the screen

image
Under user sessions successful login of the user is shown
image

@thenicejake
Copy link

@babvin Did you find any solution?
I ran into the same issue with Keycloak.
Thanks in advance.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

6 participants