keycloak-scim/docs/guides/high-availability/partials/infinispan/infinispan-credentials.adoc
Alexander Schwartz 834ef79509
Adding a Keycloak High Availability section to Keycloak's docs
The content was moved over from the Keycloak Benchmark subproject.

Closes #24844

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Pedro Ruivo <pruivo@redhat.com>
Co-authored-by: Michal Hajas <mhajas@redhat.com>
Co-authored-by: Kamesh Akella <kakella@redhat.com>
Co-authored-by: Ryan Emerson <remerson@redhat.com>
Co-authored-by: Anna Manukyan <amanukya@redhat.com>
Co-authored-by: Thomas Darimont <thomas.darimont@googlemail.com>
Co-authored-by: Stian Thorgersen <stian@redhat.com>
Co-authored-by: Thomas Darimont <thomas.darimont@googlemail.com>
Co-authored-by: AndyMunro <amunro@redhat.com>
2023-11-23 12:27:47 +00:00

35 lines
984 B
Text

[[infinispan-credentials]]
. Configure the credential to access the Infinispan cluster.
+
Keycloak needs this credential to be able to authenticate with the Infinispan cluster.
The following `identities.yaml` file sets the username and password with admin permissions
+
[source,yam,subs="+attributes"]
----
credentials:
- username: developer
password: {hr-password}
roles:
- admin
----
+
The `identities.yaml` could be set in a secret as one of the following:
* As a Kubernetes Resource:
+
.Credential Secret
[.wrap]
[source,yaml]
----
include::../../examples/generated/ispn-single.yaml[tag=infinispan-credentials]
----
<1> The `identities.yaml` from the previous example base64 encoded.
+
* Using the CLI
+
[source,bash]
----
kubectl create secret generic connect-secret --from-file=identities.yaml
----
+
Check https://infinispan.org/docs/infinispan-operator/main/operator.html#configuring-authentication[Configuring Authentication] documentation for more details.