Links
Comment on page

Configure Keycloak Identity Provider for Kubecost

  1. 1.
    Create a new Keycloak Realm.
  2. 2.
    Navigate to Realm Settings > General > Endpoints > OpenID Endpoint Configuration > Clients.
  3. 3.
    Select Create to add Kubecost to the list of clients. Define a clientID. Ensure the Client Protocol is set to openid-connect.
  4. 4.
    Select your newly created client, then go to Settings.
    1. 1.
      Set Access Type to confidential.
    2. 2.
      Set Valid Redirect URIs to http://YOUR_KUBECOST_ADDRESS/model/oidc/authorize.
    3. 3.
      Set Base URL to http://YOUR_KUBECOST_ADDRESS.
The .Values.oidc for Keycloak should be as follows:
oidc:
enabled: true
# This should be the same as the `clientID` set in step 3 above
clientID: "YOUR_CLIENT_ID"
# Find this in Keycloak UI by going to your Kubecost client, then clicking on "Credentials".
clientSecret: "YOUR_CLIENT_SECRET"
# The k8s secret where clientSecret will be stored
secretName: "kubecost-oidc-secret"
# The login endpoint for the auth server
authURL: "http://YOUR_KEYCLOAK_ADDRES/realms/YOUR_REALM_ID/protocol/openid-connect/auth?client_id=YOUR_CLIENT_ID&response_type=code"
# Redirect after authentication
loginRedirectURL: "http://YOUR_KUBECOST_ADDRESS/model/oidc/authorize"
# Navigate to "Realm Settings" -> "General" -> "Endpoints" -> "OpenID Endpoint Configuration". Set to the discovery URL shown on this page.
discoveryURL: "YOUR_DISCOVERY_URL"
©2023 Stackwatch, Inc. All rights reserved. Designed & built in California.