Red Hat Integration - Service Registry
  • Preface
  • Installation
    • Setting Up Project
    • PostgreSQL Database Deployment
      • Install Crunchy Postgres for Kubernetes Operator
      • Deploy PostgreSQL Database
    • Service Registry Deployment
      • Install Service Registry Operator
      • Configuring Service Registry
  • Testing
    • Testing Service Registry
    • REST API Testing Using Postman
    • Performance Testing Using hey
  • Security
    • Securing Service Registry
    • Red Hat Single Sign-On Deployment
      • Installing Red Hat Single Sign-On Operator
      • Deploy Red Hat Single Sign-On
      • Create Keycloak Realm For Service Registry
    • Configuring Service Registry
      • Service Registry with HTTPS
      • Service Registry without HTTPS (less secure)
      • Configuring Service Registry
      • Enable HTTP Basic Authentication
      • Enable Annonymous Read Access
      • Enable Role-Based Authorization
    • Testing Secure Service Registry API
  • Client Application
    • Create SSO Client for Application
    • Kafka Client Application
  • Appendix
    • CRD References
    • Installation Helper Script
    • Service Registry & SSO Integration with Self-Signed Certificate
Powered by GitBook
On this page
  1. Security
  2. Configuring Service Registry

Configuring Service Registry

PreviousService Registry without HTTPS (less secure)NextEnable HTTP Basic Authentication

Last updated 2 years ago

  1. Go to Operators -> Installed Operators menu, then select Red Hat Integration - Service Registry Operator. Click the Apicurio Registry tab, and then service-registry link to update Service Registry.

  2. Insert this snippet under the configuration section as a screenshot below.

    security:
       keycloak:
          url: "https://keycloak-<NAMESPACE>.apps.<CLUSTER_DOMAIN>/auth"
          realm: "registry"

    Make sure you have edit the url value to be the same as Keycloak HTTP route (as you configured in Ingress in ) or HTTPS route (you've noted in the step 5 in ) depends on whether you're using HTTP or HTTPS for Service Registry web console URL.

    Also update the realm attribute value as well if you changed to something else when you created a realm in the step 2 in .

  3. Wait for a few minutes, the Service Registry Operator will rollout new pods with the configs. Then open the Service Registry web console URL, you will be directed to login page via Red Hat Single Sign-On.

    Enter username and password configured in YAML when you created KeycloakRealm in to login.

  4. You should be able to log in to Service Registry web console and log out from the console via user icon at the top right corner.

this section
this section
this section
this section
Service Registry Authn & Authz
Service Registry Authn & Authz
Service Registry Authn & Authz
Service Registry Authn & Authz
Service Registry Authn & Authz
Service Registry Authn & Authz