Hello,
we just installed Proxmox 7.0-9 and tried to connect it with our Keycloack authentification server.
But we have problems with sign in. Redirect to Login screen works fine, we have setted redirect correct uri based on first redirect url to Keycloak.
After login at CODE_TO_TOKEN phase we receive this error in proxmox syslog console
Configuration looks like this:
And client configuration in KeyCloak is like this:
In mappers we have added username Token mapper:
Thanks in advance
Patrik
we just installed Proxmox 7.0-9 and tried to connect it with our Keycloack authentification server.
But we have problems with sign in. Redirect to Login screen works fine, we have setted redirect correct uri based on first redirect url to Keycloak.
After login at CODE_TO_TOKEN phase we receive this error in proxmox syslog console
Code:
Jul 8 15:29:09 proxmox01 pvedaemon[226983]: openid authentication failure; rhost=::ffff:[redacted] msg=Failed to verify ID token: Signature verification failed
Configuration looks like this:
Code:
root@proxmox01:/etc/pve# cat domains.cfg
pam: pam
comment Linux PAM standard authentication
openid: [redacted]
client-id proxmox01.[redacted]
issuer-url http://id.[redacted]/auth/realms/[redacted]
autocreate 1
client-key [redacted]
default 1
username-claim username
pve: pve
comment Proxmox VE authentication server
And client configuration in KeyCloak is like this:
Code:
Client ID: proxmox01.[redacted]
Name: empty
Description: empty
Enabled: ON
Always Display in Console: OFF
Consent Required: ON
Display Client On Consent Screen: OFF
Login Theme: empty
Client Protocol: openid-connect
Access Type: confidential
Standard Flow Enabled: ON
Implicit Flow Enabled: ON
Direct Access Grants Enabled: ON
Service Accounts Enabled: OFF
OAuth 2.0 Device Authorization Grant Enabled: OFF
Authorization Enabled: OFF
Root URL: empty
Valid Redirect URIs: https://proxmox01.[redacted]:8006
Base URL: empty
Admin URL: empty
Web Origins: empty
Backchannel Logout URL: empty
Backchannel Logout Session Required: OFF
Backchannel Logout Revoke Offline Sessions: OFF
Full Scope Allowed: ON
In mappers we have added username Token mapper:
Code:
Protocol: openid-connect
ID: [redacted]
Name: username
Mapper Type: User Property
Property: username
Token Claim Name: username
Claim JSON Type: String
Add to ID token: ON
Add to access token: ON
Add to userinfo: ON
Thanks in advance
Patrik
Last edited: