Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Readme suggestion - Keycloak required service account role #3

Open
timk153 opened this issue Mar 5, 2024 · 1 comment
Open

Readme suggestion - Keycloak required service account role #3

timk153 opened this issue Mar 5, 2024 · 1 comment

Comments

@timk153
Copy link

timk153 commented Mar 5, 2024

Very useful plugin! thank you.

TLDR: Mention in the documentation that the Keycloak client providing the client secret and id for the plugin to operate must have the realm-management view clients service account role assigned.


Having followed through the readme in detail, I was getting back "could not retrieve client secret" when attempting to read client secrets. Nothing was being written out in vaults logs.

I dug through the code base, found the keycloak go client and issued the commands manually using postman to authenticate and query keycloak. I discovered 403 responses which lead me to the service account roles (ought to have been obvious in hindsight!),

Either way, if it appeared in the readme it would have saved me some time.

@mxab
Copy link
Collaborator

mxab commented Mar 7, 2024

Hi thank you for you're feedback. I also just realised that this is kind of missing from the docs.

I think I assumed that everyone is using the terraform module which is mentioned in the Create Client section

But it makes more sense to state it explicitly and also the link to the actual modul is broken I just noticed 😅

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants