New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sx5 868 pr keycloak identity provider #56742
Sx5 868 pr keycloak identity provider #56742
Conversation
@elfelip this PR contains the following merge commits: Please rebase your branch to remove these commits. |
109716d
to
2357328
Compare
As a maintainer of a module in the same namespace this new module has been submitted to, your vote counts for shipits. Please review this module and add |
Hi @elfelip, Thank you very much for your interest in Ansible. This plugin/module is no longer maintained in this repository and has been migrated to https://github.com/ansible-collections/community.general |
SUMMARY
Add Keycloak Identity provider module
ISSUE TYPE
COMPONENT NAME
keycloak_identity_provider
ADDITIONAL INFORMATION
module: keycloak_identity_provider
short_description: Configure an identity provider in Keycloak
description:
version_added: "2.9"
options:
realm:
description:
default: master
alias:
description:
required: true
displayName:
description:
required: false
providerId:
description:
required: false
enabled:
description:
required: false
default: true
updateProfileFirstLoginMode:
description:
required: false
trustEmail:
description:
required: false
storeToken:
description:
required: false
default: true
addReadTokenRoleOnCreate:
description:
required: false
authenticateByDefault:
description:
required: false
firstBrokerLoginFlowAlias:
description:
required: false
postBrokerLoginFlowAlias:
description:
required: false
linkOnly:
description:
default: False
config:
description:
required: false
type: dict
suboptions:
openIdConfigurationUrl:
description:
- Open ID configuration URL of the IdP to configure. Will be used to configure IdP endpoints.
type: str
clientId:
description:
- Client ID used to authenticate Keycloak on this IdP
type: str
clientSecret:
description:
- Client secret to authenticate client on the IdP.
type: str
disableUserInfo:
description:
- Do we need to disable user info endpoint query. Default value is False.
- Must be set to true when IdP is Microsoft ADFS.
type: str
choices:
- true
- false
default: false
defaultScope:
description:
- Default scope supported with this IdP
type: str
guiOrder:
description:
- Order to display the IdP button on login screen. Lower's first.
type: int
backchannelSupported:
description:
- Is back channel logout is supported by the IdP.
type: str
choices:
- true
- false
default: true
mappers:
description:
required: false
type: list
suboptions:
name:
description:
- Name of the mapper
type: str
identityProviderMapper:
description:
- Type of identity provider mapper.
type: str
choices:
- oidc-user-attribute-idp-mapper
- oidc-role-idp-mapper
config:
description:
- Configuration for this mapper.
type: dict
suboptions:
claim:
description:
- Name of the claim to map.
type: str
user.attribute:
description:
- This option is for oidc-user-attribute-idp-mapper
- User attribute to copy the claim value to.
type: str
claim.value:
description:
- This option is for oidc-role-idp-mapper
- Role will be granted to the user only if the claim match this value.
type: str
role:
description:
- This option is for oidc-role-idp-mapper
- Role to be granted to the user if the claim match claim.value.
type: str
state:
description:
choices: [ "present", "absent" ]
default: present
force:
description:
type: bool
default: false
extends_documentation_fragment:
notes:
author: