Extended Traefik lables for access restrictions on keycloak
parent
d59a2ace4a
commit
7eb2650482
@ -1,3 +1,2 @@
|
||||
# Used to authorize access to keaycloak via tcp/443 on the hcloud firewall
|
||||
keycloak_https_whitelisted_ips:
|
||||
- 0.0.0.0/0 # Public access to keycloak
|
||||
keycloak_https_whitelisted_ips: []
|
||||
|
||||
@ -1,15 +1,2 @@
|
||||
# Used to authorize access to keaycloak via tcp/443 on the hcloud firewall
|
||||
keycloak_https_whitelisted_ips:
|
||||
- 0.0.0.0/0 # Public access to keycloak
|
||||
|
||||
# Use these Realm ACLs to create custom Traefik labels for Keycloak to restrict admin access per realm
|
||||
# Both variables are mandatory!
|
||||
# name: <realm_name>
|
||||
# admin_ips: <ip/range in cidr notation>
|
||||
keycloak_admin_realm_acls:
|
||||
- name: management
|
||||
admin_ips:
|
||||
- 79.140.117.133/32 # mha
|
||||
- name: mhel
|
||||
admin_ips:
|
||||
- 79.140.117.133/32 # mha
|
||||
keycloak_https_whitelisted_ips: []
|
||||
|
||||
Loading…
Reference in New Issue