You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
hetzner-ansible/roles/keycloak/templates/keycloak-realm-create-clien...

76 lines
2.2 KiB
Django/Jinja

{
"adminUrl": "{{ admin_url }}",
"attributes": {
"saml.assertion.signature": "false",
"saml.force.post.binding": "false",
"saml.multivalued.roles": "false",
"saml.encrypt": "false",
"saml.server.signature": "false",
"saml.server.signature.keyinfo.ext": "false",
"exclude.session.state.from.auth.response": "false",
"saml_force_name_id_format": "false",
"saml.client.signature": "false",
"tls.client.certificate.bound.access.tokens": "false",
"saml.authnstatement": "false",
"display.on.consent.screen": "false",
"saml.onetimeuse.condition": "false"
},
"authenticationFlowBindingOverrides": {},
"authorizationServicesEnabled": true,
"bearerOnly": false,
"clientAuthenticatorType": "client-secret",
"clientId": "{{ client_id }}",
"consentRequired": false,
"defaultClientScopes": [
"role_list",
"profile",
"roles",
"email"
],
"directAccessGrantsEnabled": true,
"enabled": true,
"frontchannelLogout": false,
"fullScopeAllowed": true,
"implicitFlowEnabled": false,
"name": "{{ client_name }}",
"nodeReRegistrationTimeout": -1,
"notBefore": 0,
"optionalClientScopes": [],
"protocol" : "{{ protocol | default('openid-connect') }}",
"protocolMappers": [
{
"name": "username",
"protocol": "openid-connect",
"protocolMapper": "oidc-usermodel-property-mapper",
"consentRequired": false,
"config": {
"user.attribute": "username",
"claim.name": "sub",
"id.token.claim": "true",
"access.token.claim": "true",
"userinfo.token.claim": "true"
}
},
{
"name": "groups",
"protocol": "openid-connect",
"protocolMapper": "oidc-group-membership-mapper",
"consentRequired": false,
"config": {
"full.path": "true",
"id.token.claim": "true",
"access.token.claim": "true",
"claim.name": "groups",
"userinfo.token.claim": "true"
}
}
],
"publicClient": false,
"redirectUris": {{ redirect_uris }},
"rootUrl": "{{ root_url }}",
"secret": "{{ secret }}",
"serviceAccountsEnabled": true,
"standardFlowEnabled": true,
"surrogateAuthRequired": false,
"webOrigins": {{ web_origins }}
}