Ansible Role keycloak¶
This role installs Keycloak.
Mandatory Requirements¶
Minimum supported Keycloak version:
Keycloak 24.0.0
Make sure you have OpenJDK installed.
Keycloak 25+: OpenJDK 21
Keycloak 24+: OpenJDK 17
Install one of the following database servers and create a database and a user for said database. For MariaDB, this can be done using the linuxfabrik.lfops.mariadb_server role.
mariadb
mssql
mysql
oracle
postgres
If Keycloak itself should terminate TLS (e.g. when not running behind a reverse proxy, or when using a reverse proxy in reencrypt/passthrough mode), you need to provide SSL/TLS certificates via keycloak__https_certificate_file and keycloak__https_certificate_key_file. This can be done using the linuxfabrik.lfops.acme_sh role. When running behind a reverse proxy that terminates TLS (edge mode), no certificates are needed, and you can leave the certificate variables empty (the default).
If you use the „Setup Keycloak“ Playbook, this installation is automatically done for you (you still have to take care of providing the required versions).
All Keycloak config settings are described here: https://www.keycloak.org/server/all-config
Mandatory Role Variables¶
keycloak__admin_login
The temporary Keycloak Admin login credentials. To harden security, create a permanent admin account after logging in as a temporary admin user, and delete the temporary one.
Type: Dictionary.
Subkeys:
username:Mandatory. Username.
Type: String.
password:Mandatory. Password.
Type: String.
keycloak__db_login
The database login credentials for keycloak.
Type: Dictionary.
Subkeys:
username:Mandatory. Username.
Type: String.
password:Mandatory. Password.
Type: String.
keycloak__hostname
The hostname where keycloak is reachable.
Type: String.
keycloak__version
The version of Keycloak that should be installed.
Type: String.
Example:
# mandatory
keycloak__admin_login:
password: 'password'
username: 'keycloak-admin'
keycloak__db_login:
password: 'password'
username: 'keycloak'
keycloak__hostname: 'keycloak.local'
keycloak__version: '26.1.2'
Optional Role Variables¶
keycloak__db_url
The full database JDBC URL. If not provided, a default URL is set based on the selected database vendor.
Type: String.
Default: unset
keycloak__db_url_database
The database name for Keycloak. If the db-url option is set, this option is ignored.
Type: String.
Default:
'keycloak'
keycloak__db_url_host
The host where the database for Keycloak is running. If the db-url option is set, this option is ignored.
Type: String.
Default:
'localhost'
keycloak__db_vendor
Specifies the database server Keycloak is supposed to use. Changing this requires a full run with the
keycloaktag, askc.sh buildneeds to be re-executed. Possible options:mariadb,mssql,mysql,oracle,postgres.Type: String.
Default:
'mariadb'
keycloak__expose_healthcheck_endpoints
If the server should expose healthcheck endpoints.
Type: Bool.
Default:
true
keycloak__expose_metrics_endpoints
If the server should expose metrics endpoints.
Type: Bool.
Default:
true
keycloak__hostname_backchannel_dynamic
Enables dynamic resolving of backchannel URLs, including hostname, scheme, port and context path. Set to
trueif your application accesses Keycloak via a private network. If set totrue,keycloak__hostnameneeds to be specified as a full URL.Type: Bool.
Default:
false
keycloak__https_certificate_file
The file path to a server certificate or certificate chain in PEM format. Only needed when Keycloak itself terminates TLS (reencrypt/passthrough). Leave empty for edge proxy setups where the reverse proxy handles TLS.
Type: String.
Default:
''
keycloak__https_certificate_key_file
The file path to a private key in PEM format. Only needed when Keycloak itself terminates TLS (reencrypt/passthrough). Leave empty for edge proxy setups where the reverse proxy handles TLS.
Type: String.
Default:
''
keycloak__https_cipher_suites
The cipher suites to use. If none is given, a reasonable default is selected.
Type: String.
Default: unset
keycloak__https_protocols
The TLS protocol versions Keycloak should use. Only applies when HTTPS certificate files are provided.
Type: String.
Default:
'TLSv1.3,TLSv1.2'
keycloak__log
Enable one or more log handlers in a comma-separated list.
Type: String.
Default:
'file'
keycloak__log_file
Set the log file path and filename.
Type: String.
Default:
'/var/log/keycloak/keycloak.log'
keycloak__mode
The mode to start Keycloak in. The development mode is targeted for people trying out Keycloak the first time and get it up and running quickly. It also offers convenient defaults for developers, for example to develop a new Keycloak theme. Possible options:
production,development.Type: String.
Default:
'production'
keycloak__proxy_headers
The proxy headers that should be accepted by the server. Only applies in production mode without HTTPS certificates (edge proxy mode).
Type: String.
Default:
'xforwarded'
keycloak__proxy_trusted_addresses
A comma separated list of trusted proxy addresses. Only applies in production mode without HTTPS certificates (edge proxy mode).
Type: String.
Default: unset
keycloak__service_enabled
Enables or disables the service, analogous to
systemctl enable/disable --now.Type: Bool.
Default:
true
keycloak__spi_sticky_session_encoder_infinispan_should_attach_route
https://www.keycloak.org/server/reverseproxy#_enable_sticky_sessions
Type: Bool.
Default:
false
keycloak__state
Controls the Systemd service. One of
started,stopped,reloaded.Type: String.
Default:
'started'
Example:
# optional
keycloak__db_url: 'jdbc:mariadb://localhost/keycloak/'
keycloak__db_url_database: 'keycloak'
keycloak__db_url_host: 'localhost'
keycloak__db_vendor: 'mariadb'
keycloak__expose_healthcheck_endpoints: true
keycloak__expose_metrics_endpoints: true
keycloak__hostname_backchannel_dynamic: false
keycloak__https_certificate_file: '/etc/pki/tls/certs/www.example.com-chain.crt'
keycloak__https_certificate_key_file: '/etc/pki/tls/private/www.example.com.key'
keycloak__https_cipher_suites: 'TLS_RSA_WITH_AES_128_GCM_SHA256'
keycloak__https_protocols: 'TLSv1.3,TLSv1.2'
keycloak__log: 'file'
keycloak__log_file: '/var/log/keycloak/keycloak.log'
keycloak__mode: 'production'
keycloak__proxy_headers: 'xforwarded'
keycloak__proxy_trusted_addresses: '10.0.0.2'
keycloak__service_enabled: true
keycloak__spi_sticky_session_encoder_infinispan_should_attach_route: false
keycloak__state: 'started'
Using a reverse proxy¶
See the Keycloak reverse proxy documentation for details. When running behind a reverse proxy that terminates TLS (edge mode), leave the HTTPS certificate variables empty. The role will automatically set http-enabled=true and proxy-headers (default: xforwarded). Optionally set keycloak__proxy_trusted_addresses to restrict which proxy addresses are trusted. When the reverse proxy does not terminate TLS (reencrypt/passthrough), provide certificate paths via keycloak__https_certificate_file and keycloak__https_certificate_key_file.