Neuvector SSO Configuration
Prerequisites
- Ensure the Global SSO Settings have already been configured for this cluster.
- Access to Keycloak Master Realm
Create Keycloak Client
tip
If this client already exists due to it being configured for another cluster, consider adding the environment name as common prefix to the client name. For example, the client name could be my-org-run-neuvector.
- While you are in the
smoothgluerealm, click onClientsunderManagein the left pane. - Click
Create client. - Enter client name
neuvectorforClient ID. - Click on the
Nextbutton. - Toggle on
Client authentication. - Click on the
Nextbutton. Note: The application's FQDN name may be obtained by runningkubectl get virtualservice -A - Enter
https://{{ application_fqdn }}/openId_authforValid Redirect URIs. - Click on the
Savebutton.
Creating Client Scopes
Neuvector needs to be added in the Client Scopes.
- While you are in the
smoothgluerealm, click onClient Scopes. - Click
Create client scope. - Enter
NeuvectorforName, and click on theSavebutton. - Go to the
Mapperstab. - Click
Configure a new mapper. - Select
Group Membership - Enter the following information:
- Name -
Groups - Token claim Name -
groups - Full group path - Enabled
- Add to ID token - Enabled
- Add to access token - Enabled
- Save
- Name -
- Go to
Clients, and click on the same client name received for Neuvector. - Go to the
Client Scopestab. - Click
Add client scope. - Enable the
Neuvectorclient scope. - Click
Add->Default.
SSO Configuration
Retrieve the client_secret from the Keycloak client:
- As a Keycloak Admin and within the
smoothgluerealm, clickClientson the left-hand panel. - Click on the
neuvectorclient. - Click on the
Credentialstab. - Copy the value from the
Client Secretfield.
Add the following values to bigbang-secrets.yaml to configure SSO:
neuvector:
values:
neuvector.ini:
auth.generic_oauth:
role_attribute_strict: true
sso:
enabled: true
client_id: neuvector # should match the client name in keycloak
client_secret: "" # change to your Neuvector client secret
group_claim: groups
group_mapped_roles:
- group: /_structsureAdmins
global_role: admin
- group: /_structsureAudit
global_role: reader
info
See How to Configure Big Bang Values for more information on configuring Big Bang applications.