Skip to content

devsisters/kcinit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Kcinit

This is a command line utility to perform login on a Keycloak realm through OpenID Connect. This tool was implemented to provide application developers a mechanism to obtain access tokens for their command line applications. Logins done through this tool are persisted so that they can live between command line invocations and even console restarts. Applications can use this tool to provide login and SSO to other command line applications. For example, let's say you have a command line util call 'kubectl' that needs an access token to invoke on its backend and it can receive this token from a --token command line option. You could do this:

 kubectl --token=$(kcinit token)

kcinit would prompt you for login information and obtain a token for the kubectl client application registered in the Keycloak realm. You could also set up an alias for this.

 alias kubectl='kubectl --token=$(kcinit token)

Setup

In your Keycloak realm, you will first have to set up and register a master oauth client in your keycloak realm that will be used as the master login session for your command line console. You can name this client anything you want and it can be a public or confidential client. This client must have token exchange permissions for each application that you want to do SSO with on the command line console.

Any kcinit command will prompt you for additional information if you have not installed kcinit correctly in your directory.

While kcinit configuration can obtain any config parameter from the command line or even an environment variable, you should

The kcinit program can obtain connection information from command line parameters, environment variables, or through a preconfigured config file. To create a preconfigured config file, run the following command:

 $ kcinit install

This will prompt you for information about the URL of the auth server, the keycloak realm, and the client you created. This will store configuration information with $HOME/.keycloak/kcinit. If you want to store your configuration someplace else, set the KCINIT_CONFIG environment variable before running install.

Usage

After you have installed kcinit, you can login with this command

 $ kcinit login

This will store a token file under $HOME/.keycloak/kcinit for your master client.

Invoking the kcinit token command will output the access token receive from a login of the master client to stdout. If you have not logged in yet, you will be prompted to enter in your credentials. You can specify kcinit token [client] to obtain a token from another client application registered in the realm. The master client must have token exchange permissions to to get this token.

kcinit token will use any existing token that you already have queried for as it stores these tokens on disk after retrieval. The access token timeout is checked, and if it is expired, the tool will automatically refresh the token.

The output of kcinit token can be captured in an environment variable. All interactive actions are all done on stderr.

To logout, just type kcinit logout. This will remove any token files that were created because of a login or an exchange.

Hacking and Contributing

$ go install

That's it. Note that all dependencies must be in the vendor directory. We manage dependencies with the dep command line tool. You must run:

$ dep ensure

This command will pull in any dependencies into the vendor directory.

About

Generic keycloak command line login tool

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 99.4%
  • Shell 0.6%