Closed loneil closed 11 months ago
Probably question for @WadeBarnes or @esune if using the digitaltrust-citz
realm means we should add any client/roles/etc added to any backup scripts/automation or any documentation or anything. Or ok to just go into console and set up as needed.
We have historically - as far as I know - set everything up manually in the console since usually configurations are relatively simple and we have limited numbers of users/features relying on them. Do you know if there are automation tools to get these set-up tasks more automated, or was it just to make sure we keep things in sync if there were any?
We have historically - as far as I know - set everything up manually in the console since usually configurations are relatively simple and we have limited numbers of users/features relying on them. Do you know if there are automation tools to get these set-up tasks more automated, or was it just to make sure we keep things in sync if there were any?
I know some teams have used realm exports and tied that into scripts for setting up envs and stuff, but no, generally I've just done the same with the console. Just noting that if there is any existing stuff like that for this realm we could keep it up to date.
@loneil, I have some thoroughly tested scripts and documentation for migrating clients from one realm to another here; https://github.com/bcgov/DITP-DevOps/blob/main/code/scripts/KeyCloak%20Migration.md
Planning for Week of Dec 11
Added KC config to CITZ realms (dev/test/prod) and tested them out. Dev/PR helm val changes deployed and Tenant UI update is in-place.
Sandbox/Test/Prod changes contained here https://github.com/bcgov/trust-over-ip-configurations/pull/176
Sandbox/Test/Prod helm updated to point at new KC realm. I've migrated my Innkeeper user over and can add anyone else to the group in those new realms as required.
Presently the OIDC capabilities of Traction (the Tenant UI, specifically) providing IDIR login use the custom Keycloak realm(s)
digitaltrust-nrm
We don't need to use this realm for what we need so we might as well just decommission it so that the SSO team has one less custom realm to track and administer.The things the realm are used for are quite small, as the actual VC things the DITP team is doing are contained in another custom realm
digitaltrust-citz
so we can just cut the Traction needs over to that one.Traction uses OIDC for
Steps to set up the
digitaltrust-citz
realm to meet the needs of the Traction Tenant UI Do for dev, test, and prodSet up the Tenant UI config for each environment to reflect the new settings from above In each config, find the
oidc
blocks in thefrontend
andserver
config blocks.default.json
. That's committed to the Traction repo.values-pr.yaml
values-development.yaml
. Merging to main will deploy the dev env and update the settings.Decommission
digitaltrust-nrm
once everything is working. Tracking this separately as https://github.com/bcgov/DITP/issues/77