Ansible role for Keycloak
- Installs Keycloak
- Installs a systemd service
- Creates an admin user
- The target host must have systemd installed (e.g. CentOS/RHEL 7+, Debian 8+, Ubuntu 15.04+)
-
Create a playbook that includes this role and define any variables as described below
-
After running the playbook, open the firewall as needed
- Port 8080 for HTTP
- Port 8443 for HTTPS
-
Navigate to the server, e.g. https://192.168.56.100:8443
-
Go to the Administration Console and log in using the admin username and password you set (see Variables below)
keycloak_admin_password
(required)- Password for the admin user
keycloak_admin_username
(optional)- Username for the admin user
- Default value:
admin
keycloak_group
(optional)- Default value:
keycloak
- Default value:
keycloak_home
(optional)- Default value:
/opt/keycloak
- Default value:
keycloak_java_version
(optional)- Default value: see defaults/main.yml
keycloak_user
(optional)- Default value:
keycloak
- Default value:
keycloak_version
(optional)- Version of Keycloak to install
- Default value: see defaults/main.yml
proxy_env
(optional)- Proxy settings; see https://docs.ansible.com/ansible/latest/user_guide/playbooks_environment.html#setting-the-remote-environment
- Default value:
{}
- hosts: keycloak-servers
roles:
- keycloak
vars:
keycloak_admin_password: "{{ vault_keycloak_admin_password }}"
See docs for various post-install documentation