Extended Traefik lables for access restrictions on keycloak
parent
d59a2ace4a
commit
7eb2650482
@ -1,3 +1,2 @@
|
|||||||
# Used to authorize access to keaycloak via tcp/443 on the hcloud firewall
|
# Used to authorize access to keaycloak via tcp/443 on the hcloud firewall
|
||||||
keycloak_https_whitelisted_ips:
|
keycloak_https_whitelisted_ips: []
|
||||||
- 0.0.0.0/0 # Public access to keycloak
|
|
||||||
|
|||||||
@ -1,15 +1,2 @@
|
|||||||
# Used to authorize access to keaycloak via tcp/443 on the hcloud firewall
|
# Used to authorize access to keaycloak via tcp/443 on the hcloud firewall
|
||||||
keycloak_https_whitelisted_ips:
|
keycloak_https_whitelisted_ips: []
|
||||||
- 0.0.0.0/0 # Public access to keycloak
|
|
||||||
|
|
||||||
# Use these Realm ACLs to create custom Traefik labels for Keycloak to restrict admin access per realm
|
|
||||||
# Both variables are mandatory!
|
|
||||||
# name: <realm_name>
|
|
||||||
# admin_ips: <ip/range in cidr notation>
|
|
||||||
keycloak_admin_realm_acls:
|
|
||||||
- name: management
|
|
||||||
admin_ips:
|
|
||||||
- 79.140.117.133/32 # mha
|
|
||||||
- name: mhel
|
|
||||||
admin_ips:
|
|
||||||
- 79.140.117.133/32 # mha
|
|
||||||
|
|||||||
Loading…
Reference in New Issue