Red Hat Integration - Service Registry
  • Preface
  • Installation
    • Setting Up Project
    • PostgreSQL Database Deployment
      • Install Crunchy Postgres for Kubernetes Operator
      • Deploy PostgreSQL Database
    • Service Registry Deployment
      • Install Service Registry Operator
      • Configuring Service Registry
  • Testing
    • Testing Service Registry
    • REST API Testing Using Postman
    • Performance Testing Using hey
  • Security
    • Securing Service Registry
    • Red Hat Single Sign-On Deployment
      • Installing Red Hat Single Sign-On Operator
      • Deploy Red Hat Single Sign-On
      • Create Keycloak Realm For Service Registry
    • Configuring Service Registry
      • Service Registry with HTTPS
      • Service Registry without HTTPS (less secure)
      • Configuring Service Registry
      • Enable HTTP Basic Authentication
      • Enable Annonymous Read Access
      • Enable Role-Based Authorization
    • Testing Secure Service Registry API
  • Client Application
    • Create SSO Client for Application
    • Kafka Client Application
  • Appendix
    • CRD References
    • Installation Helper Script
    • Service Registry & SSO Integration with Self-Signed Certificate
Powered by GitBook
On this page
  1. Client Application

Create SSO Client for Application

PreviousTesting Secure Service Registry APINextKafka Client Application

Last updated 2 years ago

To allow client application to access Service Registry secured by SSO, a SSO client ID and secret should be given to the client application so it can use the given client ID and secret for authentication when it calls Service Registry APIs. Also, the client ID and secret will be used to configure Kafka Producer and Consumer when the the client application wants to access Service Registry.

Following these steps to create a new SSO client:

  1. Login to SSO web console with admin user.

  2. Select the Registry realm (or the realm you created in ), then select Clients menu, and then click Create button.

  3. Enter Client ID value as you need, then click Save button.

  4. Change Access Type to confidential, turn off Standard Flow Enabled and Direct Access Grants Enabled options. And turn on Service Accounts Enabled option to enable OAuth 2.0 Client Credentials flow only.

    Note. You can enable others flows as you need. But for demostration purpose, only Service Accounts Enabled option is enough.

  5. Scroll down to bottom then click Save button.

  6. Go to Credentials tab, you should be able to see secret value. This will be given to client application along with the client ID.

this section
Create SSO client
Create SSO client
Create SSO client
Create SSO client
Create SSO client