Generate admin token
Pre-requisites
Steps to create an admin role
Goto keycloak admin page, Ex: <domain>/auth/
The default admin credentials will be (admin / admin). Update the default admin password for security reasons.
Goto roles section and add a
admin
role if not present
You can create a new user or update the existing user with the above role. A client can also be used if you have a backend service that will call the registry APIs.
Steps to create a user and attach an admin role
Goto keycloak admin page, Ex: <domain>/auth/
Goto
users
section and click onAdd user
button.Fill in the required information and click on
Save
buttonGoto
Credential
section and provide the password for the userOnce the user is created goto
Role Mappings
sectionSelect
admin
role from theAvailable Roles
and click onAdd selected
Use the below API to generate the token for the above user
Request
To authenticate as an entity, we need to make the following request:
Generate token API
POST
http:/keycloak-url/auth/realms/{realm}/protocol/openid-connect/token
Headers
Name | Type | Description |
---|---|---|
content-type* | String | Set to |
Request Body
Name | Type | Description |
---|---|---|
grant_type* | String | Set to |
client_id* | String | Set to |
username* | String | The |
password* | String | Set to |
Important variables in the response body:
Field | In | Type | Description |
---|---|---|---|
| body |
| Access token used to retrieve/update entity |
| body |
| Number of seconds before the access token will be declared invalid |
| body |
| Should be |
| body |
| Using this token, what information we can access about the entity |
Usage
cURL
HTTPie
{keycloak-url}
is usually http://localhost:8080, and{realm}
is usuallysunbird-rc
.The
{keycloak-url}
is usuallylocalhost:{port}
. The port can be found under thekeycloak
section in thedocker-compose.yml
file. The{realm}
can be found at the top of therealm-export.json
file used to configure keycloak.
Steps to create a client with an admin role
Goto keycloak admin page
Goto
clients
section and click onAdd
buttonGive a new client id and click on the save button
Update the
access type
toconfidential
.Turn on
Service Accounts Enabled
button.Add a
Valid Redirect Url
Ex: http://localhost:8081/authAnd click on the save button
Goto
Service Account Roles
tabSelect
admin
role from theAvailable Roles
and click onAdd selected
Goto
Credentials
section and click onRegenerate secret
and copy the value
Use the below API to get the token for the above client created
Generate token api
POST
http:/keycloak-url/auth/realms/{realm}/protocol/openid-connect/token
Headers
Name | Type | Description |
---|---|---|
Content-Type* | String | application/x-www-form-urlencoded |
Request Body
Name | Type | Description |
---|---|---|
grant_type* | client_credentials | |
client_id* | String | Use the client name that was used above |
client_secret* | String | Use the client secret that was generated in the above steps |
Last updated