Keycloak
Keycloak is an open source Identity and Access Management solution that can be used to authenticate RapidMiner Go users.
To find out more about Keycloak, visit:https://www.keycloak。org/
When using Keycloak, the RMID component of Go is not needed.
配置
Edit the.env
file to add the URL of your Keycloak installation:KEYCLOAK_URL=https://keycloak.mydomain.com
The KEYCLOAK_URL cannot belocalhost
because it needs to be accessible from inside the AM docker container.
You can create the sampleGo
realm by importing the realm file atkeycloak/realm-export.json
This realm contains two OIDC clients -go-frontend
andgo-backend
. It also has 2 predefined roles:
go:user
- the default user roleam:admin
- admin role needed to access the automodeler Admin UI at/am/admin
Docker-compose configuration
You can find a sample docker-compose configuration indocker-compose-services-keycloak.yml
.
To enable Keycloak authentication in Go addkeycloak
to Spring active profiles for the Automodeler service:
rapidminer-automodeler: image: rapidminer/rapidminer-automodeler:${IMAGE_TAG_AM} mem_limit: ${MEMORY_AM} environment: SPRING_PROFILES_ACTIVE: on-prem,db-postgresql,branding,keycloak
Here are some of the variables you might need to set:
KEYCLOAK_REALM: Go KEYCLOAK_AUTH_SERVER_URL: ${KEYCLOAK_URL}/auth/ KEYCLOAK_RESOURCE: go-backend FRONTEND_KEYCLOAK_CLIENT_ID: go-frontend