2

My question is:

Specifically, how do I configure traefik to double proxy through keycloak gatekeepr to authenticate my services as outlined below?

I know my authentication chain looks like the title suggests but I'm completely missing the configuration requirements for traefik to point to keycloak gatekeeper, et al.

background:

I'm building a fairly complicated development home lab and trying to implement keycloak authentication/authorization behind a traefik proxy. My network layout is such that I'm afforded name resolution via local dnsmasq -so IP/name resolution is not a problem. See here for my network setup.

The basic Layout is like this-ish:

  • dnsmasq listens on localhost and dhcp (when connected) and a private network (i.e. 127.0.0.1, 10.x.x.x and optionally 192.x.x.x)
  • traefik listens on :80/443 and routes to my services on the private (10.x.x.x) network just fine -similarly over my docker custom netwok. No problems.
  • keycloak works just fine routing to services on it's own (when traefik is shutdown and I use keycloak.js or other mechanisms)

There are a lot of moving parts here so I've tried to simplify this question as much as possible.

Any and all help is welcome.

Jan Garaj
  • 889

1 Answers1

1

I'm closing out this question.

The answer is fairly complicated. I commented on my post with a reference to a project that was helpful in figuring things out. I am still working on some documentation that will be helpful for others/myself in the future but that is going to take some time.

Also, I have created a few diagrams that might be helpful for understanding the layout and the flow for creating clients that will work with gatekeeper.