HTTPS access to Keycloak

Description

The KeycloakClient bean should be created using a feign.Client.Default equipped with an SSLSocketFactory if needed.

In order to achieve that, the following is needed

  1. Add a configuration parameter to enable TLS for the Keycloak client

  2. Add a configuration parameter pointing to the file with the trust store to use

  3. Add a configuration parameter for the trust store password

  4. Improve the construction of the KeycloakClient bean to create an SSLSocketFactory that uses the trust store, create a feign.Client.Default that uses that SSLSocketFactory and pass the Client to the feign.Feign.Builder

Environment

None

Potential Workaround

None

Checklist

hide

Activity

Show:

Yauhen VavilkinMarch 19, 2024 at 1:59 PM

I returned the task to the ‘in progress’ status because another place was found where application-poc-tools interacts with keycloak. There is a logic where we get a certificate from keycloak in order to validate client tokens on the mgr-components side. This interaction must support TLS.

Done

Details

Assignee

Reporter

Priority

Story Points

Sprint

Development Team

Eureka

Fix versions

TestRail: Cases

Open TestRail: Cases

TestRail: Runs

Open TestRail: Runs

Created March 4, 2024 at 10:57 AM
Updated September 30, 2024 at 11:30 AM
Resolved June 17, 2024 at 2:16 PM
TestRail: Cases
TestRail: Runs

Flag notifications