Skip to content

Commit 63d5a18

Browse files
openshift-cherrypick-robotthemr0cclaude
authored
[release-1.9-post-cqa] [RHDHBUGS-516]: Add required Keycloak client roles to RHBK auth setup (#2050)
Co-authored-by: Fabrice Flore-Thébault <ffloreth@redhat.com> Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
1 parent 5879e60 commit 63d5a18

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

modules/shared/snip-enabling-user-authentication-with-rhbk-common-first-steps.adoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,15 @@ Save the value for the next step:
88

99
.. To register your {product-short} in {rhbk}, in the created realm, {rhbk-docs-link}/html-single/getting_started_guide/index#getting-started-zip-secure-the-first-application[secure the first application], with:
1010
... **Client ID**: A distinctive client ID, such as __<{product-very-short}>__.
11+
... **Client authentication**: Set to *On* (confidential access type).
12+
... **Service accounts roles**: Enable *Service accounts roles*.
1113
... **Valid redirect URIs**: Set to the OIDC handler URL: `pass:c,a,q[{my-product-url}/api/auth/oidc/handler/frame]`.
1214
... Go to the **Credentials** tab and copy the **Client secret**.
15+
... Go to the **Service accounts roles** tab and click *Assign role*.
16+
Filter by client `realm-management` and assign the following roles:
17+
* `query-groups`
18+
* `query-users`
19+
* `view-users`
1320
... Save the values for the next step:
1421
* **Client ID**
1522
* **Client Secret**

0 commit comments

Comments
 (0)