Red Hat Integration - Service Registry
  • Preface
  • Installation
    • Setting Up Project
    • PostgreSQL Database Deployment
      • Install Crunchy Postgres for Kubernetes Operator
      • Deploy PostgreSQL Database
    • Service Registry Deployment
      • Install Service Registry Operator
      • Configuring Service Registry
  • Testing
    • Testing Service Registry
    • REST API Testing Using Postman
    • Performance Testing Using hey
  • Security
    • Securing Service Registry
    • Red Hat Single Sign-On Deployment
      • Installing Red Hat Single Sign-On Operator
      • Deploy Red Hat Single Sign-On
      • Create Keycloak Realm For Service Registry
    • Configuring Service Registry
      • Service Registry with HTTPS
      • Service Registry without HTTPS (less secure)
      • Configuring Service Registry
      • Enable HTTP Basic Authentication
      • Enable Annonymous Read Access
      • Enable Role-Based Authorization
    • Testing Secure Service Registry API
  • Client Application
    • Create SSO Client for Application
    • Kafka Client Application
  • Appendix
    • CRD References
    • Installation Helper Script
    • Service Registry & SSO Integration with Self-Signed Certificate
Powered by GitBook
On this page
  1. Security
  2. Configuring Service Registry

Service Registry without HTTPS (less secure)

PreviousService Registry with HTTPSNextConfiguring Service Registry

Last updated 2 years ago

By default, Service Registry is installed without HTTPS configured for its Route as a screenshot below. You can OPTIONALLY create new or update existing route with HTTPS following the steps in .

However, if you really don't want to enable HTTPS for Service Registry then you need to create an additional Service and Ingress without HTTPS configured for Red Hat SSO/Keycloak as well so Service Registry can talk to Keycloak via HTTP protocol. Follow these steps to create Service and Ingress for Keycloak.

  • To create a Service, go to Networking -> Services menu then click on Create Service button. Copy the content in file and paste into the editor then click on Create button.

  • To create an Ingress, go to Networking -> Ingresses menu then click on Create Ingress button. Copy the content in file and paste into the editor, then edit the host attribute value with this format keycloak-http-<NAMESPACE>.apps.<CLUSTER_DOMAIN> i.e. http://keycloak-http-service-registry.apps.cluster-px4pm.opentlc.com and then click on Create button.

  • Go to Networking -> Routes menu you should be able to see a new HTTP Keycloak Route is automatically created. Then click on the URL link to open Red Hat SSO web console.

    Note. Copy the URL displayed in web browser for later use when .

this section
keycloak-service.yaml
keycloak-ingress.yaml
configuring Service Registy
Service Registry Authn & Authz
Service Registry Authn & Authz
Service Registry Authn & Authz
Service Registry Authn & Authz
Service Registry Authn & Authz
Service Registry Authn & Authz