Add Keycloak authentication for ETL users. Configure ETL routes and login/logout functionality. Integrate ETL with Keycloak SSO. Update vite.config.js to include etl.js. Create EtlController with home, login, and logout routes. Implement EtlAuthenticator for email/password login. Configure security.yaml for ETL firewall and providers. Add etl.js and etl.scss for ETL frontend. Add Keycloak client configuration for ETL. Update PrestaireController to use absolute URL for login.
24 lines
1.0 KiB
YAML
24 lines
1.0 KiB
YAML
knpu_oauth2_client:
|
|
clients:
|
|
# This key 'keycloak' is what you'll use in your code
|
|
keycloak:
|
|
type: keycloak
|
|
# All these should be stored in your .env file
|
|
auth_server_url: '%env(KEYCLOAK_AUTH_SERVER_URL)%'
|
|
realm: '%env(KEYCLOAK_REALM)%'
|
|
client_id: '%env(KEYCLOAK_CLIENT_ID)%'
|
|
client_secret: '%env(KEYCLOAK_CLIENT_SECRET)%'
|
|
# The route name where Keycloak will redirect the user back to
|
|
redirect_route: connect_keycloak_check
|
|
redirect_params: {}
|
|
keycloak_etl:
|
|
type: keycloak
|
|
# All these should be stored in your .env file
|
|
auth_server_url: '%env(KEYCLOAK_AUTH_SERVER_URL)%'
|
|
realm: '%env(KEYCLOAK_REALM)%'
|
|
client_id: '%env(KEYCLOAK_CLIENT_ID)%'
|
|
client_secret: '%env(KEYCLOAK_CLIENT_SECRET)%'
|
|
# The route name where Keycloak will redirect the user back to
|
|
redirect_route: connect_keycloak_etl_check
|
|
redirect_params: {}
|