axum-oidc/examples/basic
2024-04-20 18:34:23 +02:00
..
keycloak_example example keycloak added 2024-04-20 18:34:23 +02:00
src Cleanup of RP-Initiated Logout 2024-03-26 21:15:21 +01:00
.env.example example keycloak added 2024-04-20 18:34:23 +02:00
.gitignore example keycloak added 2024-04-20 18:34:23 +02:00
Cargo.toml Added first implementation of RP Initiated Logout 2024-03-25 17:20:44 +01:00
README.md example keycloak added 2024-04-20 18:34:23 +02:00

Example OIDC Setup

This is an exmple using Keycloak as the OIDC provider.

Steps for statring the service and adding an account:

  • starting keycloak: docker-compose -f keycloak/docker-compose.yml up
  • create a new realm in keycloak
  • create a new client in the realm
  • add an account in the realm
  • set the accounts password under credentials tab

Steps for attaching the application to the OIDC provider:

  • copy the .env.example file to .env
  • generate your issuers IP (localhost in this case): hostname -I | awk '{print $1}' (THIS MAY CHANGE DEPENDING ON YOUR NETWORK)
  • set the ISSUER in the .env file to the IP
  • set the CLIENT_ID in the .env file to the client id of the client you created in keycloak
  • set the CLIENT_SECRET in the .env file to the client secret of the client you created in keycloak