Keycloak Keycloak is an open source identity and access management server with support for OpenID Connect, OAUTH 2.0 and SAML 2.0.
Administration An administrative user with the username admin is automatically created in the master realm. Its initial password can be configured by setting and defaults to changeme. The password is not stored safely and should be changed immediately in the admin panel. Refer to the Admin Console section of the Keycloak Server Administration Guide for information on how to administer your Keycloak instance.
Database access Keycloak can be used with either PostgreSQL or MySQL. Which one is used can be configured in . The selected database will automatically be enabled and a database and role created unless is changed from its default of localhost or is set to false. External database access can also be configured by setting , , and as appropriate. Note that you need to manually create a database called keycloak and allow the configured database user full access to it. must be set to the path to a file containing the password used to log in to the database. If and are kept at their defaults, the database role keycloak with that password is provisioned on the local database instance. The path should be provided as a string, not a Nix path, since Nix paths are copied into the world readable Nix store.
Frontend URL The frontend URL is used as base for all frontend requests and must be configured through . It should normally include a trailing /auth (the default web context). determines whether Keycloak should force all requests to go through the frontend URL. By default, Keycloak allows backend requests to instead use its local hostname or IP address and may also advertise it to clients through its OpenID Connect Discovery endpoint. See the Hostname section of the Keycloak Server Installation and Configuration Guide for more information.
Setting up TLS/SSL By default, Keycloak won't accept unsecured HTTP connections originating from outside its local network. HTTPS support requires a TLS/SSL certificate and a private key, both PEM formatted. Their paths should be set through and . The paths should be provided as a strings, not a Nix paths, since Nix paths are copied into the world readable Nix store.
Additional configuration Additional Keycloak configuration options, for which no explicit NixOS options are provided, can be set in . Options are expressed as a Nix attribute set which matches the structure of the jboss-cli configuration. The configuration is effectively overlayed on top of the default configuration shipped with Keycloak. To remove existing nodes and undefine attributes from the default configuration, set them to null. For example, the following script, which removes the hostname provider default, adds the deprecated hostname provider fixed and defines it the default: /subsystem=keycloak-server/spi=hostname/provider=default:remove() /subsystem=keycloak-server/spi=hostname/provider=fixed:add(enabled = true, properties = { hostname = "keycloak.example.com" }) /subsystem=keycloak-server/spi=hostname:write-attribute(name=default-provider, value="fixed") would be expressed as services.keycloak.extraConfig = { "subsystem=keycloak-server" = { "spi=hostname" = { "provider=default" = null; "provider=fixed" = { enabled = true; properties.hostname = "keycloak.example.com"; }; default-provider = "fixed"; }; }; }; You can discover available options by using the jboss-cli.sh program and by referring to the Keycloak Server Installation and Configuration Guide.
Example configuration A basic configuration with some custom settings could look like this: services.keycloak = { enable = true; initialAdminPassword = "e6Wcm0RrtegMEHl"; # change on first login frontendUrl = "https://keycloak.example.com/auth"; forceBackendUrlToFrontendUrl = true; sslCertificate = "/run/keys/ssl_cert"; sslCertificateKey = "/run/keys/ssl_key"; database.passwordFile = "/run/keys/db_password"; };