Replies: 2 comments 7 replies
-
So it looks to be a problem with version 25 of keycloak. I was able to use 24.0.5 without issue |
Beta Was this translation helpful? Give feedback.
3 replies
-
I was able to get version keycloak 26.1.0 working. Im issue was I was trying to run keycloak in https and https even though it was behind a reverse proxy. I also needed to add the cas that signed the web certificate to stig manager. I don't know why this was working with earlier versions of keycloak but I guess they fixed some issues which caused stig manager to freak out since I didn't provide the ca certs |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I originally post this issue #1368 but was told to post a discussion.
I'm currently just using podman for my deployment with separate containers and no docker compose. This is currently what it looks like
podman create --replace --name nginx
-p 20000:20000
-v /var/lib/containers/storage/volumes/nginx/_data/nginx.conf:/etc/nginx/nginx.conf
-v /var/lib/containers/storage/volumes/nginx/_data/[server cert].crt:/etc/nginx/cert.pem
-v /var/lib/containers/storage/volumes/nginx/_data/[server cert].key:/etc/nginx/privkey.pem
-v /var/lib/containers/storage/volumes/nginx/_data/dod_CAs.pem:/etc/nginx/dod-certs.pem
-v /var/lib/containers/storage/volumes/nginx/_data/index.html:/usr/share/nginx/html/index.html
--network stig-manager
registry1.dso.mil/ironbank/opensource/nginx/nginx:1.26.2
podman create --replace --name stig-manager-auth --restart=always
-e KEYCLOAK_ADMIN=admin
-e KEYCLOAK_ADMIN_PASSWORD=admin
-e KC_PROXY-HEADERS=xforwarded
-e KC_HOSTNAME=https://[ip of host]:20000/kc/
-e KC_HOSTNAME_ADMIN=https://[ip of host]:20000/kc
-e KC_SPI_X509CERT_LOOKUP_PROVIDER=nginx
-e KC_SPI_X509CERT_LOOKUP_NGINX_SSL_CLIENT_CERT=SSL-CLIENT-CERT
-e KC_TRUSTSTORE_PATHS=/tmp/truststore.p12
-e KC_TRUSTSTORE_FILE_PASSWORD=1234
-v /var/lib/containers/storage/volumes/nginx/_data/dod_CAs.p12:/tmp/truststore.p12
-v stig-manager-auth:/opt/keycloak/data/
--network stig-manager
registry1.dso.mil/ironbank/opensource/keycloak/keycloak:25.0.4 start-dev
podman create --replace --name stig-manager-db --restart=always
-e MYSQL_ROOT_PASSWORD=rootpw
-e MYSQL_DATABASE=stigman
-e MYSQL_USER=stigman
-e MYSQL_PASSWORD=stigman
-v stig-manager-db:/var/lib/mysql
--network stig-manager
registry1.dso.mil/ironbank/opensource/mysql/mysql8:8.0.36-ubi9
podman create --replace --name stig-manager --restart=always
-e STIGMAN_OIDC_PROVIDER=http://stig-manager-auth:8080/realms/stigman
-e STIGMAN_CLIENT_OIDC_PROVIDER=https://[ip of host]:20000/kc/realms/stigman
-e STIGMAN_DB_HOST=stig-manager-db
-e STIGMAN_DB_PASSWORD=stigman
-e STIGMAN_CLASSIFICATION=U
-e STIGMAN_SWAGGER_ENABLED=true
-e STIGMAN_LOG_LEVEL=4
-e NODE_EXTRA_CA_CERTS=/tmp/truststore.crt
-v /var/lib/containers/storage/volumes/nginx/_data/[server cert].crt:/tmp/truststore.crt
--network stig-manager
registry1.dso.mil/ironbank/opensource/stig-manager/stig-manager:1.4.13
when using this configuration I get an Ext.Ajax error, I tried to configure the NODE_EXTRA_CA_CERTS but I wasn't sure which cert to point it too and nothing that I tried worked. The weird part is when I replace the stig-manager-auth container (keycloak) with the one below it works and authenticates without issue. The below container was taken from stigman-orchestration repo and the above container was modified from the stig-manager-auth to include the x.509 certificate authentication process instead of username and password
podman create --replace --name stig-manager-auth --restart=always
-e KEYCLOAK_ADMIN=admin
-e KEYCLOAK_ADMIN_PASSWORD=admin
-e KC_PROXY=edge
-e KC_HOSTNAME_URL=https://[ip of host]:20000/kc/
-e KC_HOSTNAME_ADMIN_URL=https://[ip of host]:20000/kc
-e KC_SPI_X509CERT_LOOKUP_PROVIDER=nginx
-e KC_SPI_X509CERT_LOOKUP_NGINX_SSL_CLIENT_CERT=SSL-CLIENT-CERT
-e KC_SPI_TRUSTSTORE_FILE_FILE=/tmp/truststore.p12
-e KC_SPI_TRUSTSTORE_FILE_PASSWORD=1234
-v stig-manager-auth-old:/opt/keycloak/data/
-v /var/lib/containers/storage/volumes/nginx/_data/create-x509-user.jar:/opt/keycloak/providers/create-x509-user.jar
-v /var/lib/containers/storage/volumes/nginx/_data/dod_CAs.p12:/tmp/truststore.p12
--network stig-manager
registry1.dso.mil/ironbank/opensource/keycloak/keycloak:19.0.2 start-dev
Beta Was this translation helpful? Give feedback.
All reactions