keycloak support #85

Closed
opened 2025-11-20 05:06:07 -05:00 by saavagebueno · 5 comments
Owner

Originally created by @KlavsKlavsen on GitHub (Nov 26, 2021).

Hi guys,
I just found this project and it looks like something I've been wanting for a while.. (and only tailscale does - but I'm not a fan of trusting such services :)

I leave this here to suggest perhaps supporting keycloak as an auth mechanism? Its very widely supported (through OIDC protocol) - here's f.ex. how we setup ArgoCD to allow login via keycloak: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/user-management/keycloak.md
And you CAN actually also setup keycloak to allow google user account auth - which means keycloak login - will allow you to login with your google account (if thats what you want) or a keycloak user..

Supporting keycloak is a one-stop way to get 2fa, google-auth, with self-hosting support and everything (as keycloak supports these things).

ArgoCd implements it by using https://github.com/coreos/go-oidc

Originally created by @KlavsKlavsen on GitHub (Nov 26, 2021). Hi guys, I just found this project and it looks like something I've been wanting for a while.. (and only tailscale does - but I'm not a fan of trusting such services :) I leave this here to suggest perhaps supporting keycloak as an auth mechanism? Its very widely supported (through OIDC protocol) - here's f.ex. how we setup ArgoCD to allow login via keycloak: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/user-management/keycloak.md And you CAN actually also setup keycloak to allow google user account auth - which means keycloak login - will allow you to login with your google account (if thats what you want) or a keycloak user.. Supporting keycloak is a one-stop way to get 2fa, google-auth, with self-hosting support and everything (as keycloak supports these things). ArgoCd implements it by using https://github.com/coreos/go-oidc
Author
Owner

@braginini commented on GitHub (Nov 26, 2021):

Thank you fort he suggestion!

We have some discussiona here as well
https://github.com/wiretrustee/wiretrustee-dashboard/issues/9

@braginini commented on GitHub (Nov 26, 2021): Thank you fort he suggestion! We have some discussiona here as well https://github.com/wiretrustee/wiretrustee-dashboard/issues/9
Author
Owner

@braginini commented on GitHub (Nov 26, 2021):

By the way @KlavsKlavsen , what is your main use case?

@braginini commented on GitHub (Nov 26, 2021): By the way @KlavsKlavsen , what is your main use case?
Author
Owner

@KlavsKlavsen commented on GitHub (Nov 26, 2021):

My usecase is to be able to connect to servers behind NAT - from our "travelling workers" - ie. all us working remotely/from home - to be able to access the individual networks we need.. replacing a proprietary VPN.. But in the end I want this to use "temporary keys" - so access is logged and granted (and can be NOT granted f.ex. - for certain users to certain places)..
So developer f.ex. only has access to specific places - and SRE's had access to everything (but access is logged when its opened and when its closed down again) (or just logged with a lifetime logged as well - atleast).
We have a couple of guys who would gladly do PRs as well, if we get it working for us - so hopefully we can contribute something worthwhile too - once it gets there (and we start to use it in production)

@KlavsKlavsen commented on GitHub (Nov 26, 2021): My usecase is to be able to connect to servers behind NAT - from our "travelling workers" - ie. all us working remotely/from home - to be able to access the individual networks we need.. replacing a proprietary VPN.. But in the end I want this to use "temporary keys" - so access is logged and granted (and can be NOT granted f.ex. - for certain users to certain places).. So developer f.ex. only has access to specific places - and SRE's had access to everything (but access is logged when its opened and when its closed down again) (or just logged with a lifetime logged as well - atleast). We have a couple of guys who would gladly do PRs as well, if we get it working for us - so hopefully we can contribute something worthwhile too - once it gets there (and we start to use it in production)
Author
Owner

@KlavsKlavsen commented on GitHub (Nov 26, 2021):

if we get it working with auth0 f.ex. - we'd gladly take a stab at adding keycloak support.

@KlavsKlavsen commented on GitHub (Nov 26, 2021): if we get it working with auth0 f.ex. - we'd gladly take a stab at adding keycloak support.
Author
Owner
@braginini commented on GitHub (Sep 8, 2022): Solved in https://github.com/netbirdio/dashboard/issues/9 Integration Docs: https://netbird.io/docs/integrations/identity-providers/self-hosted/using-netbird-with-keycloak
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: SVI/netbird#85