Skip to content


Repository files navigation


Oidckube functions as a wrapper around minikube that will initialize, deploy, and partially configure the instance to use Keycloak; an Open Source Identity and Access Management tool as an Authentication Source. The Keycloak manifests are based off the Keycloak Helm Chart.


NOTE: This script only supports Virtualbox as the virtualization provider for minikube (use minikube config set vm-driver virtualbox to override). If the cfssl and jq requirements are not found, it will attempt to download and install them locally into the bin sub-directory.


  1. Within the project directory, create a config file based off the supplied config example (config.example). If you opt to forgo doing so, one based off the config.example file will be generated automatically. This file is used by both and to configure and authenticate to Keycloak.
Variable Default Description
KEYCLOAK_ADDRESS keycloak.devlocal Address for the locally deployed instance of Keycloak
KEYCLOAK_AUTH_REALM k8s Name of the realm within Keycloak used for Kubernetes Authentication
KEYCLOAK_CLIENT_ID oidckube Name of the OIDC client used for Kubernetes Authentication
KEYCLOAK_CLIENT_SECRET OIDC Secret associated with the Client ID. NOTE: This cannot be populated ahead of time, and is is generated by Keycloak itself.
  1. Run ./ init. This will automate the certificate generation, CA certificate insertion, deploy Keycloak, and configure minikube to use the Host's DNS resolver.
  2. Modify your system's /etc/hosts file with the information printed out from the previous step. This will allow both your host and minikube instance to reference the KEYCLOAK_ADDRESS.
  3. Login to keycloak administrator portal by going to https://<KEYCLOAK_ADDRESS> e.g. https://keycloak.devlocal, and use the credentials keycloak / keycloak NOTE: Keycloak takes a few moments to start after minikube comes up and may not be immediately accessible once booted.
  4. Create a new auth realm using the same name as defined in the KEYCLOAK_AUTH_REALM config. NOTE: If you are using the default config, at this time you may import the k8s-realm-example.json to skip the group and client configuration (you will however have to generate a new client secret). For the import, select only Import groups, Import clients, and Import client roles, then set it to skip if the resource already exists.
  5. Navigate to the clients section and create a new client.
  6. Give it the same name as defined in the KEYCLOAK_CLIENT_ID config.
  7. At the new client configuration page, If you'd like to change the Authorization type from Public to Confidential change the Access Type to be confidential, and configure the Valid Redirect URI to be https://<KEYCLOAK_ADDRESS>/*. Then press Save. Otherwise, you may leave it as is. If you did change it to Confidential, click on the Credentials Tab and generate a new secret, then copy the Secret and update the config file setting KEYCLOAK_CLIENT_SECRET to the newly generated value.
  8. Click on the Mappers Tab and then Create.
  9. Call this new mapping groups, set the Mapper Type to Group Membership and Token Claim Name to groups, then save.
  10. Add a second Mapping, called email_verified. Set the Mapper Type to Hardcoded claim, the Token Claim Name to email_verified, Claim value to true, and Claim JSON Type to boolean. This is ONLY required in versions of Kubernetes less than 1.11. For information regarding this claim, see this Github Issue: kubernetes/kubernetes#59496.
  11. Navigate to the Groups section and create 2 new groups: cluster-users and cluster-admins. These map to the cluster role bindings created during initialization (manifests/crb-users.yaml and manifests/crb-admins.yaml).
  12. Goto Users and create two new users giving them fake emails e.g. admin@keycloak.devlocal and user@keycloak.devlocal, assigning them a password under the Credentials tab, and lastly add one to each of the groups created in the previous step. At this point, Keycloak is now configured. NOTE: If you would like to assign the user an optional TOTP, you may impersonate them from the Users view and configure their Authenticator.
  13. Shut down the VM with ./ stop. This is needed to reconfigure the kube-apiserver.
  14. Run ./ start to start the minikube instance up with the generated OIDC config. Give it time to fully boot up.
  15. Run ./ It will prompt you for a username, password and an optional TOTP code. Use the email address of one of the accounts created earlier. the ./ script will add the user automatically to your kube config.
  16. Create a new context using the newly added account. e.g:
$ kubectl config set-context oidckube-user --cluster=minikube --user=user@keycloak.devlocal --namespace=default
$ kubectl config set-context oidckube-admin --cluster=minikube --user=admin@keycloak.devlocal --namespace=default

Both the instance of minikube and your local client should be configured to use oidc for server authentication. The cluster role bindings map the group cluster-users to the view cluster role, and cluster-admins to the cluster-admin role.


Wrapper for minikube that provisions and integrates it with Keycloak







No releases published


No packages published

Contributors 4