-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review & edit Keycloak external authentication user stories #3079
Conversation
aebb2ed
to
890919e
Compare
d6b0cea
to
ed15c12
Compare
I've updated the PR description and it's ready for review now. FYI @maximiliankolb I'm also considering labeling the Wildfly-based assembly as deprecated. And I'm not yet sure if I'll be able to include the Quarkus-based one in our d/s. Does that somehow affect orcharhino? |
I have no idea but will ask around. I will get back to you probably in the beginning of next week. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This really isn't my area, but I have a couple of observations.
guides/common/modules/con_configuring-keycloak-quarkus-authentication-for-project.adoc
Show resolved
Hide resolved
guides/common/modules/con_configuring-keycloak-wildfly-authentication-for-project.adoc
Show resolved
Hide resolved
guides/common/modules/proc_configuring-keycloak-settings-for-authentication-with-cac-cards.adoc
Outdated
Show resolved
Hide resolved
...modules/proc_logging-in-to-project-configured-with-keycloak-as-an-authentication-source.adoc
Show resolved
Hide resolved
...modules/proc_logging-in-to-project-configured-with-keycloak-as-an-authentication-source.adoc
Outdated
Show resolved
Hide resolved
@asteflova This is OK for orcharhino. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry for not making it earlier 🙂
I gave a bit of thought to a few parts, if they are not really what was intended with these changes, feel free to reject them.
guides/common/modules/proc_configuring-group-mapping-for-keycloak-authentication.adoc
Show resolved
Hide resolved
guides/common/modules/proc_configuring-group-mapping-for-keycloak-authentication.adoc
Outdated
Show resolved
Hide resolved
...mon/modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-cli.adoc
Outdated
Show resolved
Hide resolved
guides/common/modules/proc_configuring-project-with-keycloak-for-totp-authentication.adoc
Outdated
Show resolved
Hide resolved
guides/common/modules/con_configuring-keycloak-quarkus-authentication-for-project.adoc
Show resolved
Hide resolved
guides/common/modules/con_configuring-keycloak-wildfly-authentication-for-project.adoc
Outdated
Show resolved
Hide resolved
.../modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-web-ui.adoc
Outdated
Show resolved
Hide resolved
guides/common/modules/proc_configuring-keycloak-settings-for-authentication-with-cac-cards.adoc
Outdated
Show resolved
Hide resolved
38b4167
to
f153bfa
Compare
QE confirms that the Red Hat build of Keycloak (Quarkus-based Keycloak) workflow steps do result in a working setup. (Thanks @lhellebr!) As a result, I'm setting the labels to show that tech review has been done. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Max talk in the Community Demo today, made me realize that I set a blocker, I'm sorry for that, was not my intention 🙂
.../modules/con_prerequisites-for-configuring-project-with-keycloak-quarkus-authentication.adoc
Show resolved
Hide resolved
.../proc_configuring-a-project-client-to-provide-projectwebui-authentication-with-keycloak.adoc
Outdated
Show resolved
Hide resolved
.../con_logging-in-to-project-configured-with-keycloak-wildfly-as-an-authentication-source.adoc
Outdated
Show resolved
Hide resolved
...es/proc_configuring-a-project-client-to-provide-hammer-cli-authentication-with-keycloak.adoc
Outdated
Show resolved
Hide resolved
070c596
to
bd8ded8
Compare
* Implement content reuse for easier maintainability * Review the docs for clarity and readability * Group login procedures into a single assemblye assembly * Test the Quarkus-based procedures * List login methods available with Keycloak * Review attributes related to Keycloak
…rmissions Co-authored-by: Lukas Magauer <42647570+lumarel@users.noreply.github.com>
bd8ded8
to
4fa4292
Compare
Rebased to resolve a conflict. We got a working setup following the Quarkus-based docs, which covers tech review. This whole PR is basically me peer reviewing #2938. All threads have been resolved. Based on a conversation with @maximiliankolb, I'm going to go ahead and merge. |
A follow-up on #2938
The goal is to cover the Keycloak external authentication user stories from beginning to end and make sure they are easy to read and follow. The changes revolve mostly around adding introductions to assemblies and modules, de-duplication, streamlining the web UI procedures, adding a few links to Keycloak docs, and general editing.
To explain the de-duplication effort in more detail:
I'm introducing a single configuration assembly for Wildfly-based Keycloak and a single one for Quarkus-based Keycloak. Before, the use cases for basic configuration, TOTP, and PIV cards use cases were each covered in a separate assembly. With this PR, I'm combining them because I believe the assemblies covering all three configurations are still sufficiently easy to follow, even though users will need to make some decisions with regards to which procedures apply to their situation ("If you want users to log in by using TOTP...").
Some modules are now reused between the Wildfly-based and Quarkus-based assemblies. They were almost identical.
I am okay with my commits getting squashed when you merge this PR.
I am familiar with the contributing guidelines.
Please cherry-pick my commits into: