UserFederation Migrations #
All migrations referring to the userfederation resource.
AddAdLdap #
Adds an active directory to the realm
Parameters #
- realm: String, optional
- name: String, not optional
- config: Map <String, String> values:
- connectionUrl, not optional
- usersDn, not optional
- bindCredential, not optional
- bindDn, not optional
- changedSyncPeriod, optional, default:“86400”
- fullSyncPeriod, optional, default:“604800”
- useKerberosAuthentication, optional, default: “false”
- allowKerberosAuthentication, optional, default: “false”
- pagination, optional, default: “true”
- readTimeout, optional, default: "”
- connectionTimeout, optional, default: "”
- connectionPooling, optional, default: “true”
- useTruststoreSPI, optional, default: “ldapsOnly”
- validatePasswordPolicy, optional, default: “false”
- searchScope, optional, default: “1”
- ldapFilter, optional, default: "”
- authenticationType, optional, default: “simple”
- userObjectClasses, optional, default: “person, organizationalPerson, user”
- uuidLdapAttribute, optional, default: “cn”
- rdnLdapAttribute, optional, default: “cn”
- usernameLdapAttribute, optional, default: “cn”
- importUsers, optional, default: “true”
- editMode, optional, default: “READ_ONLY”
- batchSize, optional, default: “1000”
- cachePolicy, optional, default: “DEFAULT”
- periodicChangedUsersSync, optional, default: “false”
- priority, optional, default: “0”
Example #
id: add-ad-ldap
author: klg71
changes:
- addAdLdap:
realm: master
name: testLdap
config:
connectionUrl: https://testldap
usersDN: usersTestDn
bindCredential: testPassword
bindDN: testBindDn
AddAdLdapFullNameMapper #
Adds a full name mapper to an active directory ldap, throws an error if the ad doesn’t exists or if a mapper with this name already exists in this ad
Parameters #
- realm: String, optional
- name: String, not optional
- adName: String, not optional
- ldapFullNameAttribute: String, not optional
- readOnly: Boolean, optional, default = true
- writeOnly: Boolean, optional, default = false
Example #
id: add-ad-ldap-full-name-mapper
author: klg71
realm: integ-test
changes:
- addAdLdapFullNameMapper:
name: testFullNamemapper
adName: testLdap
ldapFullNameAttribute: fullName
AddAdLdapGroupMapper #
Adds a group mapper to an active directory ldap, throws an error if the ad doesn’t exists or if a mapper with this name already exists in this ad
Parameters #
- realm: String, optional
- name: String, not optional
- adName: String, not optional
- groupsDn: String, not optional
- groupObjectClasses: List< String >, optional, default = emptyList()
- groupNameLdapAttribute: String, optional, default = “cn”
- preserveGroupInheritance: Boolean, optional, default = true,
- membershipLdapAttribute: String, optional, default = “member”,
- membershipAttributeType: String, optional, default = “DN”,
- membershipUserLdapAttribute: String, optional, default = “cn”,
- filter: String, optional, default = “”,
- mode: String, optional, default = “READ_ONLY”,
- ignoreMissingGroups: Boolean, optional, default = false,
- userRolesRetrieveStrategy: String, optional, default = “LOAD_GROUPS_BY_MEMBER_ATTRIBUTE”,
- mappedGroupAttributes: List< String >, optional, default = emptyList(),
- memberofLdapAttribute: String, optional, default = “memberOf”,
- dropNonExistingGroupsDuringSync: Boolean, optional, default = false
Example #
id: add-ad-ldap-group-mapper
author: klg71
realm: integ-test
changes:
- addAdLdapGroupMapper:
name: testGroupMapper
adName: testLdap
groupsDn: groupsDn
AddAdLdapHardcodedRoleMapper #
Adds a hardcoded role mapper to an active directory ldap, throws an error if the ad doesn’t exists or if a mapper with this name already exists in this ad. If the given role doesn’t exists this command throws an exception.
Parameters #
- realm: String, optional
- name: String, not optional
- adName: String, not optional
- role: String, not optional
Example #
id: add-ad-ldap-hardcoded-role-mapper
author: klg71
realm: integ-test
changes:
- addRole:
name: testMapperRole
- addAdLdapHardcodedRoleMapper:
name: testHardcodedRoleMapper
adName: testLdap
role: testMapperRole
AddAdLdapUserControlMapperMapper #
Adds a user account control mapper to an active directory ldap, throws an error if the ad doesn’t exists or if a mapper with this name already exists in this ad.
Parameters #
- realm: String, optional
- name: String, not optional
- adName: String, not optional
Example #
id: add-ad-ldap-user-account-control-mapper
author: klg71
realm: integ-test
changes:
- addAdLdapUserAccountControlMapper:
name: testUserAccountControl
adName: testLdap
AddAdLdapUserAttributeMapperMapper #
Adds a user account attribute mapper to an active directory ldap, throws an error if the ad doesn’t exists or if a mapper with this name already exists in this ad.
Parameters #
- realm: String, optional
- name: String, not optional
- adName: String, not optional
- userModelAttribute: String, not optional
- ldapAttribute: String, not optional
- readOnly: Boolean, optional, default = false,
- alwaysReadFromLdap: Boolean, optional, default = false,
- isMandatoryInLdap: Boolean, optional, default = false
Example #
id: add-ad-ldap-user-attribute-mapper
author: klg71
realm: integ-test
changes:
- addAdLdapUserAttributeMapper:
name: testUserAttributeMapper
adName: testLdap
userModelAttribute: userModelAttribute
ldapAttribute: ldapAttribute
AddAdLdapMapperMapper #
Adds a custom mapper to an active directory ldap, throws an error if the ad doesn’t exists or if a mapper with this name already exists in this ad.
Only use this action if you can’t find a convenient method to add the mapper above. You can find the correct parameters by using the network debugging tool in chrome/firefox to inspect the requests in the keycloak gui.
Parameters #
- realm: String, optional
- name: String, not optional
- adName: String, not optional
- providerId: String, not optional
- config: Map<String,String>, not optional
Example #
id: add-ad-ldap-user-attribute-mapper
author: klg71
realm: integ-test
changes:
- addAdLdapMapper:
name: testRoleMapper
adName: testLdap
providerId: role-ldap-mapper
config:
memberof.ldap.attribute: "memberOf"
membership.attribute.type: "DN"
membership.ldap.attribute: "member"
membership.user.ldap.attribute: "cn"
mode: "READ_ONLY"
role.name.ldap.attribute: "cn"
role.object.classes: "group"
roles.dn: "rolesDn"
use.realm.roles.mapping: "true"
user.roles.retrieve.strategy: "LOAD_ROLES_BY_MEMBERSHIP_ATTRIBUTE"
AddUserFederation #
Adds a user federation to the realm
Parameters #
- realm: String, optional
- name: String, mandatory
- providerId: String, mandatory
- providerType: String, optional, default = “org.keycloak.storage.UserStorageProvider”
- config: Map <String, String>, optional
Example #
id: add-user-federation
author: klg71
changes:
- addUserFederation:
realm: master
name: testUserFederation
providerId: my-user-storage-provider
DeleteUserFederation #
Deletes an userFederation from the realm, throws an exception if it doesn’t exist.
Parameters #
- realm: String, optional
- name: String, not optional
Example #
id: delete-ad-ldap
author: klg71
changes:
- deleteUserFederation:
realm: integ-test
name: testLdap