TL;DR : Using keycloak as an IDM or LDAP Domain Aggregator
- Download the APS Identity Sync Extension: https://github.com/alex4u2nv/aps-ais-authority-sync/releases/download/v1.0.0/aps-identity-sync-java-1.0.0-jar-with-dependencies.jar
- Configure APS to Integrate with Keycloak as in the example activiti-identity-service.properties
- Configure Keycloak to integrate with multiple LDAP domains via User Federation service.
- Authenticate into APS using users that were synchronized.
- If Keycloak authentication is enabled, then authenticate through keycloak
- If other authentication methods bounded to same user ids (email address) then use that.
Alfresco Process Services (APS) 1.9 provides support for authentication through Keycloak. The integration with Keycloak gives us access to many advanced Identity Provider features, such as SAML 2.0, oAuth, OpenID, Identity Brokering and User Federation. In this article, we will review the integration of APS, and AIS (Alfresco Identity Service) in a multi-domain LDAP environment.
With the introduction of AIS into the architecture, APS can now support authentication through multiple LDAP Domains, or other federated Identity Providers. However, in order to use APS integration with AIS, users are required to be preloaded in APS. Currently the APS AIS Integration provided in APS 1.9 does not support user synchronization, so users will need to be loaded into APS via other means, such as the LDAP User Sync feature that APS supports.
Multi-Domain Use Case
In a multi-domain environment, where connecting to multiple domains are not supported by the application, this may be handled by dedicated Identity Management Services such as Microsoft Identity Manager, Forgerock Identity Management, Okta Multi-Domain and provisioning feature; ETL services like Talend Open Studio with LDAP connectors, EAI utilities like Apache Camel, Spring Integration with Spring LDAP, or MuleSoft, etc.; or a directory passthrough/aggregation as described in this article: https://ltb-project.org/documentation/general/sasl_delegation. However, since APS provides the extension points to support authority provisioning, we will leverage that in this example, to synchronize users from AIS into APS via Keycloak’s REST API.
An extension module in APS is executed via Quartz Cron settings, to poll the Keycloak REST Admin API for users, then add those users into the APS directory. Because Keycloak does not support querying via last-modify, or last-created, it is not possible to ask keycloak for a subset of users. Instead, we take all users, and eliminate the users that were already synchronized, based on created timestamp stored in Actitivi.
As noted in the above diagram, Keycloak does re-query ldap on each request to the USER REST Admin API, instead of just returning users from it’s internal database cache. Additionally, Keycloak does not handle duplicated users across multiple domains. These are two main improvements that are needed in Keycloak, in order to efficiently act as an IDM for multiple domains.
In the following project: https://github.com/alex4u2nv/aps-ais-authority-sync the released JAR file can be downloaded and installed into the activiti-app.war, where it can then be configured to synchronize users through keycloak. The configurations with keycloak starts with setting up APS – AIS (Keycloak) integration as described in the APS documentation: http://docs.alfresco.com/process-services1.9/concepts/is-intro.html with some additional properties that tell the APS keycloak sync module how to work.
Local Testing Via Docker
The project is bundled with Docker configurations to test against 3 OpenLDAP images that were extended from osixia/openldap, with demo users generated by LDIFGen.
[crayon-5e8fce2a46834561380023/] To get started, checkout the project, and execute the following command in the directory.
Which should produce an output like the following:
- http://localhost:8080/activiti-app (APS)
- http://localhost:8180/ (Keycloak)
- http://localhost:8380/ (Keycloak 4.0)
- ldap://localhost:1389 (ldap1)
- ldap://localhost:2389 (ldap2)
- ldap://localhost:3389 (ldap3)
- Activiti admin:
- User: firstname.lastname@example.org
- password: admin
- Keycloak admin:
- User: admin
- Password: admin
- User: email@example.com
- password: admin
- User: firstname.lastname@example.org
- Password: admin
- User: email@example.com
- password: admin
- Log into keycloak, and modify the admin user to have the admin email address of activiti.
- Add LDAP services to user federation service of keycloak
The docker-compose file can also be adjusted to test with the default AIS docker container, or a custom container built directly from Keycloak’s official container with the following Dockerfile
The following code snippet is an example of installing the jar file into the activiti-app.war, which is installed in a Tomcat Application container, located under /usr/local/ in a Linux environment:
The following is an example of activiti-identity-service.properties that supports integration with Keycloak, including user authentication and synchronization from Keycloak.
[crayon-5e8fce2a46849491690605/] Due to some limitations in how keycloak REST APIs, the synchronization executes as full sync. In that, the synchronization logic will integrate over all users on every run. Therefore, it is recommended that this utility is only executed nightly, or outside of peak system usage window.
Users can be created and managed directly in Keycloak. However, as mentioned in this article, we will look at multi-domain support.
For multi-domain support, we will follow the official Keycloak documentation for adding LDAP based user federation, which can be setup to periodically synchronize users from an LDAP directory into APS.
Test and validate.
- Verify that users synchronized into Keycloak.
- Log into APS verify that users and groups are synchronized into APS