Skip to main content

Keycloack

image.png

Identity Provider (IdP) Open Source con soporte para OIDC (OpenID Connect) o SAML.

https://www.keycloak.org/

✅ Soporta OIDC, OAuth2 y SAML.
✅ Se integra con LDAP/Active Directory para usuarios corporativos.
✅ Tiene un panel de administración web para gestión de identidades.
✅ Puede delegar autenticación en Google, GitHub, Microsoft, etc.
✅ Se despliega fácilmente en Kubernetes con un Helm Chart o manifiestos YAML.

Implementación 

# Añade el repositorio
helm repo add codecentric https://codecentric.github.io/helm-charts
helm repo update

# Instalación
helm install keycloak codecentric/keycloak \
  --namespace keycloak  --create-namespace \
  --set golbal.storageClass=nfs-client \
  --set postgresql.enabled=true \
  --set postgresql.persistence.enabled=true \
  --set postgresql.persistence.storageClass=nfs-client \
  --set keycloak.service.type=ClusterIP \
  --set ingress.enabled=true \
  --set ingress.ingressClassName=nginx \
  --set ingress.hosts[0]=sso.k8s.ictiberia.com
  --set ingress.tls=true \
  --set ingress.selfSigned=true

# Unistall 
helm delete keycloak -n keycloak

Namespace

apiVersion: v1
kind: Namespace
metadata:
  name: keycloak

PVCs

PostgreSQL

---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
  name: postgres-pvc
  namespace: keycloak
spec:
  accessModes:
    - ReadWriteOnce
  resources:
    requests:
      storage: 10Gi
  storageClassName: nfs-client

Keycloak

---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
  name: keycloak-pvc
  namespace: keycloak
spec:
  accessModes:
    - ReadWriteMany
  resources:
    requests:
      storage: 5Gi
  storageClassName: nfs-client

StatefulSet PostgreSQL

---
apiVersion: apps/v1
kind: StatefulSet
metadata:
  name: postgres
  namespace: keycloak
spec:
  serviceName: postgres
  replicas: 1
  selector:
    matchLabels:
      app: postgres
  template:
    metadata:
      labels:
        app: postgres
    spec:
      containers:
      - name: postgres
        image: postgres:15
        env:
        - name: POSTGRES_DB
          value: "keycloak"
        - name: POSTGRES_USER
          value: "keycloak"
        - name: POSTGRES_PASSWORD
          value: "keycloakpassword"
        ports:
        - containerPort: 5432
        volumeMounts:
        - name: postgres-storage
          mountPath: /var/lib/postgresql/data
      volumes:
      - name: postgres-storage
        persistentVolumeClaim:
          claimName: postgres-pvc

Deployment Keycloak

---
apiVersion: apps/v1
kind: Deployment
metadata:
  name: keycloak
  namespace: keycloak
spec:
  replicas: 2
  selector:
    matchLabels:
      app: keycloak
  template:
    metadata:
      labels:
        app: keycloak
    spec:
      containers:
      - name: keycloak
        image: quay.io/keycloak/keycloak:latest
        args: ["start"]
        env:
        - name: KC_DB
          value: "postgres"
        - name: KC_DB_URL
          value: "jdbc:postgresql://postgres.keycloak.svc.cluster.local:5432/keycloak"
        - name: KC_DB_USERNAME
          value: "keycloak"
        - name: KC_DB_PASSWORD
          value: "keycloakpassword"
        - name: KEYCLOAK_ADMIN
          value: "admin"
        - name: KEYCLOAK_ADMIN_PASSWORD
          value: "adminpassword"
        ports:
        - containerPort: 8080
        volumeMounts:
        - name: keycloak-storage
          mountPath: /opt/keycloak/data
      volumes:
      - name: keycloak-storage
        persistentVolumeClaim:
          claimName: keycloak-pvc

Servicios

PostgreSQL

---
apiVersion: v1
kind: Service
metadata:
  name: postgres
  namespace: keycloak
spec:
  ports:
  - port: 5432
    targetPort: 5432
  selector:
    app: postgres

Keycloak

---
apiVersion: v1
kind: Service
metadata:
  name: keycloak
  namespace: keycloak
spec:
  ports:
  - port: 80
    targetPort: 8080
  selector:
    app: keycloak

Ingress

---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: keycloak-ingress
  namespace: keycloak
  annotations:
    nginx.ingress.kubernetes.io/rewrite-target: /
    cert-manager.io/cluster-issuer: "letsencrypt-staging" # Cambiar a "letsencrypt-production" en producción
spec:
  ingressClassName: nginx
  tls:
  - hosts:
    - sso.k8s.ictiberia.com
    secretName: keycloak-tls
  rules:
  - host: sso.k8s.ictiberia.com
    http:
      paths:
      - path: /
        pathType: Prefix
        backend:
          service:
            name: keycloak
            port:
              number: 80

Comandos

# Verificar el despliegue
kubectl get pods -n keycloak
kubectl get svc -n keycloak
kubectl get ingress -n keycloak