Skip to content

Keycloak


Keycloak provides secure user authentication using the OAuth 2.0/OpenID Connect protocol. Keycloak serves as an interface to the existent user management e.g. Active Directory.

If there is an OAuth 2.0/OpenID Connect service availabe keycloak is not needed and the service could be used directly.

After the default installation, SEAL Print Client is executable but self-signed certificates are used, which have to be exchanged for the productive mode.

For security reasons, the following configuration steps are recommended.


Configure the TLS Encryption for Keycloak

In order to make the system secure, the following steps have to be executed:

  1. Convert your certificate to the PKCS12 format:

    • openssl pkcs12 -export -in <yourdomain.com.crt> -inkey <yourdomain.com.key> -out <yourdomain.com.p12> -name default -CAfile <your_provider_bundle.crt> -caname <root>
  2. Create a key store:

    • keytool -importkeystore -deststorepass <keystore_password> -destkeypass <key_password> -destkeystore <yourdomain.com.jks> -srckeystore <yourdomain.com.p12> -srcstoretype PKCS12 -srcstorepass <secret_password_used_in_csr> -alias default

      Literature

      For further information, refer to Keytool.

  3. Copy the generated key store into the JBoss configuration directory, C:\ProgramData\SEAL Systems\infrastructure\data\seal-keycloak\configuration.

  4. In the security-realms section of C:ProgramData\SEAL Systems\infrastructure\data\seal-keycloak\configuration\standalone.xml, insert the following lines:

    <security-realm name="SslRealm">
       <server-identities>
           <ssl>
               <keystore path="<yourdomain.com.jks>" relative-to="jboss.server.config.dir" keystore-password="<keystore_password>"/>
           </ssl>
       </server-identities>
    </security-realm>
    
  5. In C:\ProgramData\SEAL Systems\infrastructure\data\seal-keycloak\configuration\standalone.xml, replace the existent https-listener by the following line:

    • <https-listener name="default-ssl" socket-binding="https" security-realm="SslRealm"/>

Back to top