minikube addons list
Make sure your machine or container platform can provide sufficient memory and CPU for your desired usage of Keycloak. See Concepts for sizing CPU and memory resources for more on how to get started with production sizing.
Make sure you have Minikube installed, ideally with the Ingress addon enabled.
To check if you have the Ingress addon enabled, enter the following command:
minikube addons list
If the Ingress addon is not enabled, enter the following command to enable it:
minikube addons enable ingress
The Keycloak QuickStarts repository includes some example files to help deploy Keycloak to Kubernetes.
As a first step, create the Keycloak deployment and service by entering the following command:
kubectl create -f https://raw.githubusercontent.com/keycloak/keycloak-quickstarts/latest/kubernetes/keycloak.yaml
This command starts Keycloak on Kubernetes and creates an initial admin user with the username admin
and password
admin
.
Now create an Ingress for Keycloak by entering the following command:
wget -q -O - https://raw.githubusercontent.com/keycloak/keycloak-quickstarts/latest/kubernetes/keycloak-ingress.yaml | \
sed "s/KEYCLOAK_HOST/keycloak.$(minikube ip).nip.io/" | \
kubectl create -f -
If wget
and sed
are not available, download the file and manually edit the file replacing KEYCLOAK_HOST
with keycloak.<minikube ip address>.nip.io
.
Enter the following command to see the Keycloak URLs:
KEYCLOAK_URL=https://keycloak.$(minikube ip).nip.io &&
echo "" &&
echo "Keycloak: $KEYCLOAK_URL" &&
echo "Keycloak Admin Console: $KEYCLOAK_URL/admin" &&
echo "Keycloak Account Console: $KEYCLOAK_URL/realms/myrealm/account" &&
echo ""
If the Ingress addon is not enabled, enter the following command in a separate shell:
minikube tunnel
You can now access Keycloak from the following URL:
KEYCLOAK_URL=http://$(minikube ip):$(kubectl get services/keycloak -o go-template='{{(index .spec.ports 0).nodePort}}') &&
echo "" &&
echo "Keycloak: $KEYCLOAK_URL" &&
echo "Keycloak Admin Console: $KEYCLOAK_URL/admin" &&
echo "Keycloak Account Console: $KEYCLOAK_URL/realms/myrealm/account" &&
echo ""
Remember these URLs. You need them as you follow the instructions in this guide. The URL for the Account Console does not work yet as you need to create the realm first.
Go to the Keycloak Admin Console.
Log in with the username and password you created earlier.
A realm in Keycloak is equivalent to a tenant. Each realm allows an administrator to create isolated groups of applications and users. Initially, Keycloak
includes a single realm, called master
. Use this realm only for managing Keycloak and not for managing any applications.
Use these steps to create the first realm.
Open the Keycloak Admin Console.
Click Keycloak next to master realm, then click Create Realm.
Enter myrealm
in the Realm name field.
Click Create.
Initially, the realm has no users. Use these steps to create a user:
Verify that you are still in the myrealm realm, which is shown above the word Manage.
Click Users in the left-hand menu.
Click Create new user.
Fill in the form with the following values:
Username: myuser
First name: any first name
Last name: any last name
Click Create.
This user needs a password to log in. To set the initial password:
Click Credentials at the top of the page.
Fill in the Set password form with a password.
Toggle Temporary to Off so that the user does not need to update this password at the first login.
You can now log in to the Account Console to verify this user is configured correctly.
Open the Keycloak Account Console.
Log in with myuser
and the password you created earlier.
As a user in the Account Console, you can manage your account including modifying your profile, adding two-factor authentication, and including identity provider accounts.
To secure the first application, you start by registering the application with your Keycloak instance:
Open the Keycloak Admin Console.
Click the word master in the top-left corner, then click myrealm.
Click Clients.
Click Create client
Fill in the form with the following values:
Client type: OpenID Connect
Client ID: myclient
Click Next
Confirm that Standard flow is enabled.
Click Next.
Make these changes under Login settings.
Set Valid redirect URIs to https://www.keycloak.org/app/*
Set Web origins to https://www.keycloak.org
Click Save.
To confirm the client was created successfully, you can use the SPA testing application on the Keycloak website.
Change Keycloak URL
to the URL of your Keycloak instance.
Click Save.
Click Sign in to authenticate to this application using the Keycloak server you started earlier.
Before you run Keycloak in production, consider the following actions:
Switch to a production ready database such as PostgreSQL.
Configure SSL with your own certificates.
Switch the admin password to a more secure password.
For more information, see the server guides.