You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: authentication/Keycloak/README.md
+40-33Lines changed: 40 additions & 33 deletions
Original file line number
Diff line number
Diff line change
@@ -172,7 +172,7 @@ You can create roles and grant these roles directly to an individual user, or ev
172
172
* resDeployers
173
173
* resExecutors
174
174
175
-
For more information about ODM groups and roles, refer to the [ODM on Kubernetes documentation](https://www.ibm.com/docs/en/odm/9.0.0?topic=access-user-roles-groups).
175
+
For more information about ODM groups and roles, refer to the [ODM on Kubernetes documentation](https://www.ibm.com/docs/en/odm/9.5.0?topic=access-user-roles-groups).
176
176
177
177
178
178
2. Create a group for ODM administrators.
@@ -184,7 +184,7 @@ You can create roles and grant these roles directly to an individual user, or ev
184
184

185
185
186
186
In Menu **Manage** / **Groups**:
187
-
* Click **Create odm-admin**
187
+
* Click **odm-admin** to edit the new group
188
188
* Click the **Role mapping** tab
189
189
* Click **Assign role**
190
190
* Select "Filter by realm roles"
@@ -196,13 +196,12 @@ You can create roles and grant these roles directly to an individual user, or ev
196
196
3. Create at least one user that belongs to this new group.
197
197
198
198
In Menu **Manage** / **Users**:
199
-
* Click **Create new user**
199
+
* Click **Add user**
200
+
* Email verified: On
200
201
* Username: ``johndoe@mynicecompany.com``
201
202
* Email: ``johndoe@mynicecompany.com``
202
-
* Email Verified: On
203
203
* First name: ``John``
204
204
* Last name: ``Doe``
205
-
* Enabled: On
206
205
* Required user actions: nothing
207
206
* Groups : Click **Join Groups** , select ***odm-admin***, and click **Join**
208
207
* Click **Create**
@@ -213,22 +212,25 @@ You can create roles and grant these roles directly to an individual user, or ev
213
212
* Click **Set password**
214
213
* Fill the Password and Password confirmation fields with **johndoe**
215
214
* Temporary: Off
216
-
* Click *Save Password*
215
+
* Click **Save**
217
216
* Click the **Details** tab
218
-
* Click **Save**
217
+
* Click **Save**
218
+
* clicking **Save password** to confirm
219
219
220
220
(Optional) Every user is created with a predefined role named **default-roles-<CLIENT_ID>**.
221
221
This role has no interest. So, here is the way to unassign this role.
222
222
223
223
* In User Details, select the **Role mapping** tab
@@ -305,7 +308,7 @@ You can create roles and grant these roles directly to an individual user, or ev
305
308
- *CLIENT_SECRET* is listed in your ODM Application, in the **Credentials** tab
306
309
- *KEYCLOAK_SERVER_URL* is the issuer that can be retrieved using the **OpenID Endpoint Configuration** link of the **General** tab in the **Configure**/**Realm settings** menu
307
310
308
-
By introspecting the access_token value with the online tool [https://jwt.io](https://jwt.io), you should get:
311
+
By introspecting the access_token value with a JWT decoder tool, you should get:
309
312
310
313
```
311
314
{
@@ -324,16 +327,16 @@ You can create roles and grant these roles directly to an individual user, or ev
324
327
This token is used for the invocation of the ODM components like the Decision Center, Decision Server console, and the invocation of the Decision Server Runtime REST API.
- *CLIENT_ID* is your ODM Application, default is odm, can be retrieved in the **Manage** / **Clients** menu
332
335
- *CLIENT_SECRET* is listed in your ODM Application, in the **Credentials** tab
333
336
- *KEYCLOAK_SERVER_URL* is the issuer that can be retrieved using the **OpenID Endpoint Configuration** link of the **General** tab in the **Configure**/**Realm settings** menu
334
-
- *USERNAME* and *PASSWORD* have been created from 'Create at least one user that belongs to this new group.' section.
337
+
- The credentials used are from 'Create at least one user that belongs to this new group.' section.
335
338
336
-
By introspecting the id_token value with the online tool [https://jwt.io](https://jwt.io), you should get:
339
+
By introspecting the id_token value with a JWT decoder tool, you should get:
337
340
338
341
```
339
342
{
@@ -419,8 +422,8 @@ You can create roles and grant these roles directly to an individual user, or ev
419
422
- `webSecurity.xml` contains the mapping between Liberty J2EE ODM roles and Keycloak groups and users:
420
423
* rtsAdministrators/resAdministrators/resExecutors ODM roles are given to the CLIENT_ID (which is seen as a user) to manage the client-credentials flow
421
424
- `openIdWebSecurity.xml` contains two openIdConnectClient Liberty configurations:
422
-
*for web access to Decision Center and Decision Server consoles using userIdentifier="preferred_username" with the Authorization Code flow
423
-
*for the rest-api call using userIdentifier="preferred_username" with the client-credentials flow
425
+
*the first for web access to Decision Center and Decision Server consoles with the Authorization Code flow
426
+
*the second for the rest-api calls with the client-credentials flow
424
427
- `openIdParameters.properties` configures several features like allowed domains, logout, and some internal ODM openid features
425
428
- `ldap-configurations.xml` contains LDAP configuration for [How to import Keycloak Groups and Users using SCIM](README_FINE_GRAIN_PERMISSION.md)
426
429
@@ -451,7 +454,7 @@ You can create roles and grant these roles directly to an individual user, or ev
451
454
The output should look like:
452
455
```shell
453
456
NAME CHART VERSION APP VERSION DESCRIPTION
454
-
ibm-helm/ibm-odm-prod 24.1.0 9.0.0.1 IBM Operational Decision Manager
457
+
ibm-helm/ibm-odm-prod 25.0.0 9.5.0.0 IBM Operational Decision Manager
455
458
```
456
459
457
460
### 3. Run the `helm install` command
@@ -460,10 +463,11 @@ You can now install the product. We will use the PostgreSQL internal database an
460
463
461
464
#### a. Installation on OpenShift using Routes
462
465
463
-
See the [Preparing to install](https://www.ibm.com/docs/en/odm/9.0.0?topic=production-preparing-install-operational-decision-manager) documentation for more information.
466
+
See the [Preparing to install](https://www.ibm.com/docs/en/odm/9.5.0?topic=production-preparing-install-operational-decision-manager) documentation for more information.
@@ -504,7 +509,7 @@ You can now install the product. We will use the PostgreSQL internal database an
504
509
505
510
506
511
1. Get the ODM endpoints.
507
-
Refer to [this documentation](https://www.ibm.com/docs/en/odm/9.0.0?topic=tasks-configuring-external-access) to retrieve the endpoints.
512
+
Refer to [this documentation](https://www.ibm.com/docs/en/odm/9.5.0?topic=tasks-configuring-external-access) to retrieve the endpoints.
508
513
For example, on OpenShift you can get the route names and hosts with:
509
514
510
515
```shell
@@ -561,10 +566,12 @@ You can now install the product. We will use the PostgreSQL internal database an
561
566
562
567
### Access the ODM services
563
568
564
-
Well done! You can now connect to ODM using the endpoints you got [earlier](#register-the-odm-redirect-url) and log in as an ODM admin with the account you created in [the first step](#create-a-dedicated-odm-realm) (e.g. johndoe@mycompany.com/johndoe).
569
+
Well done! You can now connect to ODM using the endpoints you got [earlier](#register-the-odm-redirect-url) and log in as an ODM admin with the account you created in [the first step](#create-a-dedicated-odm-realm) (e.g. `johndoe@mynicecompany.com` / `johndoe`).
565
570
566
571
### Set up Rule Designer
567
572
573
+
First set up Rule Designer following [these instructions](https://www.ibm.com/docs/en/odm/9.5.0?topic=designer-installing-rule-online).
574
+
568
575
To be able to securely connect your Rule Designer to the Decision Server and Decision Center services that are running in Certified Kubernetes, you need to establish a TLS connection through a security certificate in addition to the OpenID configuration.
569
576
570
577
1. Get the following configuration files.
@@ -582,31 +589,31 @@ To be able to securely connect your Rule Designer to the Decision Server and Dec
582
589
```
583
590
Where:
584
591
- *changeme* is the fixed password to be used for the default truststore.jks file.
585
-
- *ECLIPSEINITDIR* is the Rule Designer installation directory next to the eclipse.ini file.
592
+
- *ECLIPSEINITDIR* is the Rule Designer installation directory where the eclipse.ini file is.
586
593
587
594
4. Restart Rule Designer.
588
595
589
-
For more information, refer to [this documentation](https://www.ibm.com/docs/en/odm/9.0.0?topic=designer-importing-security-certificate-in-rule).
596
+
For more information, refer to [this documentation](https://www.ibm.com/docs/en/odm/9.5.0?topic=designer-importing-security-certificate-in-rule).
590
597
591
598
### Getting Started with IBM Operational Decision Manager for Containers
592
599
593
600
Get hands-on experience with IBM Operational Decision Manager in a container environment by following this [Getting started tutorial](https://github.com/DecisionsDev/odm-for-container-getting-started/blob/master/README.md).
594
601
595
602
### Calling the ODM Runtime Service
596
603
597
-
To manage ODM runtime calls, we use the [Loan Validation Decision Service project](https://github.com/DecisionsDev/odm-for-container-getting-started/blob/master/Loan%20Validation%20Service.zip)
604
+
Log inthe Business Console as John Doe (`johndoe@mynicecompany.com` / `johndoe`).
598
605
599
-
Import the **Loan Validation Service**in Decision Center connected as John Doe.
606
+
Import the [Loan Validation Decision Service project](https://github.com/DecisionsDev/odm-for-container-getting-started/blob/master/Loan%20Validation%20Service.zip) if it is not already there.
600
607
601
608

602
609
603
-
Deploy the **Loan Validation Service** production_deployment ruleapps using the **production deployment** deployment configuration in the Deployments>Configurations tab.
610
+
Deploy the **Loan Validation Service** production_deployment ruleapp using the **production deployment** deployment configuration in the Deployments>Configurations tab.
604
611
605
612

606
613
607
614
You can retrieve the payload.json from the ODM Decision Server Console or use [the provided payload](payload.json).
608
615
609
-
As explained in the ODM on Certified Kubernetes documentation [Configuring user access with OpenID](https://www.ibm.com/docs/en/odm/9.0.0?topic=access-configuring-user-openid), we advise you to use basic authentication for the ODM runtime call for better performance and to avoid token expiration and revocation.
616
+
As explained in the ODM on Certified Kubernetes documentation [Configuring user access with OpenID](https://www.ibm.com/docs/en/odm/9.5.0?topic=access-configuring-user-openid), we advise you to use basic authentication for the ODM runtime call for better performance and to avoid token expiration and revocation.
610
617
611
618
You perform a basic authentication ODM runtime call in the following way:
612
619
@@ -622,15 +629,15 @@ If you want to perform a bearer authentication ODM runtime call using the Client
622
629
623
630
```
624
631
curl -k -X POST -H "Content-Type: application/x-www-form-urlencoded" \
0 commit comments