Keycloak Security with one tenant only

Introduction

Ontimize allows you to provide the tenant in the application properties. This is useful when the application will use a fixed tenant.

Prerequisites

There are 2 options to follow this tutorial, clone the repository with the initial state and follow the tutorial step by step, or download the final example and see which files are new and which have been updated.

Initial project

/$ git clone https://github.com/ontimize/ontimize-examples
/ontimize-examples$ cd ontimize-examples
/ontimize-examples$ git checkout boot-keycloak-login-initial

Final example

/$ git clone https://github.com/ontimize/ontimize-examples
/ontimize-examples$ cd ontimize-examples
/ontimize-examples$ git checkout boot-keycloak-login

Keycloak

We need a Keycloak instance, then we must configure a realm with a client, a role and a user. For the examples we will use the next settings:

Element Value Meaning
Url http://localhost:8082 The URL of the host for keycloak security
Realm demo The realm name
Client projectwiki The client name (Enable the implicit flow check to allow testing with Swagger UI)
Role admin The role name (For the examples we will use client roles)
User demo The username
Password demouser The user password

To simplify the code being written, three dots (…) may appear in some parts of the code. This indicates that there may be previous code before and after those dots.

Steps

Configure the role

If the role does not exist in the database, we can create it with the following command:

INSERT INTO TROLE(ID_ROLENAME,ROLENAME,XMLCLIENTPERMISSION) VALUES(0,'admin','<?xml version="1.0" encoding="UTF-8"?><security></security>')

Add the Keycloak dependency to the Boot module

The Keycloak system is integrated in the Ontimize Core module, so we need to declare it as a project dependency.

pom.xml

...
  <dependencies>
    ...
    <dependency>
      <groupId>com.ontimize.boot</groupId>
      <artifactId>ontimize-boot-starter-keycloak</artifactId>
    </dependency>
    ...
  </dependencies>
...

Enable the Keycloak security

In the application.yml we need to change the ontimize security mode to keycloak and add the following properties (More information in this link):

application.yml

ontimize:
   ...
   security:
      mode: keycloak
      keycloak:
         url: http://localhost:8082
         realm: demo
         client: projectwiki
         public-client: true
         use-client-role-mappings: true
...

Removing the configurations and classes that are no longer needed

Once the Keycloak authentication had been implemented, the configurations and the data access objects for Ontimize authentication can be removed.

OpenAPI declaration files

The CRUD endpoints for the users management are no longer used, then we can remove tem or comment out in the openapi-rest.yml and user.yml files.

openapi-rest.yml

...
paths:
  ...
#  /users/user:
#    $ref: 'api/User.yml#/default'
#  /users/user/search:
#    $ref: 'api/User.yml#/search'
  /users/login:
    $ref: 'api/User.yml#/login'
...

User.yml

#default:
#  post:
#    tags:
#      - Users
#    summary: Inserts a User.
#    description: >
#      This resource represents a user in the system.
#    x-restcontroller: orestcontroller
#    requestBody:
#      required: true
#      content:
#        application/json:
#          schema:
#            $ref: '../base/InsertParameter.yml#/components/schemas/InsertParameter'
#          examples:
#            Laura Bugle:
#              value:
#                data:
#                  USER_: 'laura'
#                  PASSWORD: '1432'
#                  NAME: 'Laura'
#                  SURNAME: 'Bugle'
#                  EMAIL: 'laurabugle@gmail.com'
#                  NIF: '11111111H'
#                  USERBLOCKED: '2016-09-19T12:00:00Z'
#                  LASTPASSWORDUPDATE: '2021-06-01T12:00:00'
#                  FIRSTLOGIN: true
#                sqltypes:
#                  USER_: 12
#                  PASSWORD: 12
#                  NAME: 12
#                  SURNAME: 12
#                  EMAIL: 12
#                  NIF: 12
#                  USERBLOCKED: 93
#                  LASTPASSWORDUPDATE: 93
#                  FIRSTLOGIN: 16
#    responses:
#      '200':
#        $ref: '../base/Responses.yml#/components/responses/EntityResult'
#      '400':
#        $ref: '../base/Responses.yml#/components/responses/BadRequest'
#      '401':
#        $ref: '../base/Responses.yml#/components/responses/Unauthorized'
#      '404':
#        $ref: '../base/Responses.yml#/components/responses/NotFound'
#      default:
#        $ref: '../base/Responses.yml#/components/responses/Unexpected'
#
#  get:
#    tags:
#      - Users
#    summary: Returns a list of Users.
#    description: >
#      This resource represents a list of users in the system.
#    x-restcontroller: orestcontroller
#    parameters:
#      - in: query
#        name: filter
#        description: Filter
#        schema:
#          type: string
#        required: false
#        examples:
#          user_:
#            value: 'USER_=laura'
#          password:
#            value: 'PASSWORD=1432'
#          name:
#            value: 'NAME=Laura'
#          surname:
#            value: 'SURNAME=Bugle'
#          email:
#            value: 'EMAIL=laurabugle@gmail.com'
#          nif:
#            value: 'NIF=11111111H'
#      - in: query
#        name: columns
#        description: Columns
#        required: false
#        schema:
#          type: string
#          example: USER_,PASSWORD,NAME,SURNAME,EMAIL,NIF,USERBLOCKED,LASTPASSWORDUPDATE,FIRSTLOGIN
#    responses:
#      '200':
#        $ref: '../base/Responses.yml#/components/responses/EntityResult'
#      '400':
#        $ref: '../base/Responses.yml#/components/responses/BadRequest'
#      '401':
#        $ref: '../base/Responses.yml#/components/responses/Unauthorized'
#      '404':
#        $ref: '../base/Responses.yml#/components/responses/NotFound'
#      default:
#        $ref: '../base/Responses.yml#/components/responses/Unexpected'
#
#  put:
#    tags:
#      - Users
#    summary: Updates a User.
#    description: >
#      This resource represents a user in the system.
#    x-restcontroller: orestcontroller
#    requestBody:
#      required: true
#      content:
#        application/json:
#          schema:
#            $ref: '../base/UpdateParameter.yml#/components/schemas/UpdateParameter'
#          examples:
#            pasword:
#              value:
#                data:
#                  PASSWORD: 'mT765HkqjY_34:76l'
#                filter:
#                  USER_: 'laura'
#                sqltypes:
#                  USER_: 12
#            email:
#              value:
#                data:
#                  EMAIL: 'laura.bugle@gmail.com'
#                filter:
#                  USER_: 'laura'
#                sqltypes:
#                  USER_: 12
#    responses:
#      '200':
#        $ref: '../base/Responses.yml#/components/responses/EntityResult'
#      '400':
#        $ref: '../base/Responses.yml#/components/responses/BadRequest'
#      '401':
#        $ref: '../base/Responses.yml#/components/responses/Unauthorized'
#      '404':
#        $ref: '../base/Responses.yml#/components/responses/NotFound'
#      default:
#        $ref: '../base/Responses.yml#/components/responses/Unexpected'
#
#  delete:
#    tags:
#      - Users
#    summary: Deletes a User.
#    description: >
#      This resource represents a user in the system.
#    x-restcontroller: orestcontroller
#    requestBody:
#      required: true
#      content:
#        application/json:
#          schema:
#            $ref: '../base/DeleteParameter.yml#/components/schemas/DeleteParameter'
#          examples:
#            userid:
#              value:
#                filter:
#                  USER_: 'laura'
#                sqltypes:
#                  USER_: 12
#    responses:
#      '200':
#        $ref: '../base/Responses.yml#/components/responses/EntityResult'
#      '400':
#        $ref: '../base/Responses.yml#/components/responses/BadRequest'
#      '401':
#        $ref: '../base/Responses.yml#/components/responses/Unauthorized'
#      '404':
#        $ref: '../base/Responses.yml#/components/responses/NotFound'
#      default:
#        $ref: '../base/Responses.yml#/components/responses/Unexpected'
#
#search:
#  post:
#    tags:
#      - Users
#    summary: Searches and returns a list of Users.
#    description: >
#      This resource represents a list of users in the system.
#    x-restcontroller: orestcontroller
#    requestBody:
#      content:
#        application/json:
#          schema:
#            $ref: '../base/QueryParameter.yml#/components/schemas/QueryParameter'
#          examples:
#            surname:
#              value:
#                filter:
#                  SURNAME: 'Bugle'
#                columns:
#                  - USER_
#                  - PASSWORD
#                  - NAME
#                  - SURNAME
#                  - EMAIL
#                  - NIF
#                  - USERBLOCKED
#                  - LASTPASSWORDUPDATE
#                  - FIRSTLOGIN
#                sqltypes:
#                  SURNAME: 12
#    responses:
#      '200':
#        $ref: '../base/Responses.yml#/components/responses/EntityResult'
#      '400':
#        $ref: '../base/Responses.yml#/components/responses/BadRequest'
#      '401':
#        $ref: '../base/Responses.yml#/components/responses/Unauthorized'
#      '404':
#        $ref: '../base/Responses.yml#/components/responses/NotFound'
#      default:
#        $ref: '../base/Responses.yml#/components/responses/Unexpected'
login:
  post:
    operationId: login
    tags:
      - Users
    summary: Validates the current session.
    description: >
      This resource represents a session in the system.
    x-hasparentpath: true
    responses:
      '200':
        $ref: '../base/Responses.yml#/components/responses/EntityResult'
      '400':
        $ref: '../base/Responses.yml#/components/responses/BadRequest'
      '401':
        $ref: '../base/Responses.yml#/components/responses/Unauthorized'
      '404':
        $ref: '../base/Responses.yml#/components/responses/NotFound'
      default:
        $ref: '../base/Responses.yml#/components/responses/Unexpected'

Configurations for user information in application.yml

The user-information-service and user-role-information-service configurations under ontimize.security are no longer used and we can remove them.

application.yml

ontimize:
...
   security:
      ...
#      user-information-service:
#         user-repository: UserDao
#         user-login-column: USER_
#         user-password-column: PASSWORD
#         query-id: login
#         other-data:
#            - NAME
#            - SURNAME
#            - EMAIL
#            - NIF
#            - USERBLOCKED
#            - LASTPASSWORDUPDATE
#            - FIRSTLOGIN
#      user-role-information-service:
#         user-role-repository: UserRoleDao
#         query-id: userRole
#         role-login-column: USER_
#         role-name-column: ROLENAME
...

User CRUD API

The CRUD endpoints for the users management are no longer used, then we can remove them or comment out the inheritance of the ORestController class in the UserRestController.

UserRestController.java

package com.ontimize.projectwiki.ws.core.rest;

// import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.http.HttpStatus;
import org.springframework.http.MediaType;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestMethod;
import org.springframework.web.bind.annotation.RestController;

// import com.ontimize.projectwiki.api.core.service.IUserService;
import com.ontimize.jee.common.dto.EntityResult;
// import com.ontimize.jee.server.rest.ORestController;


@RestController
@RequestMapping("/users")
public class UserRestController /* extends ORestController<IUserService> */ {

/*
       @Autowired
       private IUserService userSrv;

       @Override
       public IUserService getService() {
               return this.userSrv;
       }
*/

	@RequestMapping(
		value = "/login",
		method = RequestMethod.POST,
		produces = MediaType.APPLICATION_JSON_VALUE)
	public ResponseEntity<EntityResult> login() {
		return new ResponseEntity<>(HttpStatus.OK);
	}

}

Services and data access objects for user information

The user services and DAOs are no longer needed and we can remove them.

Tables for user information

With the above configurations and classes removed, we can remove the user tables from the database with the following commands:

DELETE FROM TROLE_SERVER_PERMISSION WHERE ID_ROLE_SERVER_PERMISSION = 0
DELETE FROM TSERVER_PERMISSION WHERE ID_SERVER_PERMISSION = 0
DROP TABLE PUBLIC.TUSER_PREFERENCE
DROP TABLE PUBLIC.TUSER_ROLE
DROP TABLE PUBLIC.TUSER
And we can remove them from the database creation script.

templateDB.txt

...
CREATE MEMORY TABLE PUBLIC.TUSER(USER_ VARCHAR(50) NOT NULL PRIMARY KEY,PASSWORD VARCHAR(255),NAME VARCHAR(50),SURNAME VARCHAR(50),EMAIL VARCHAR(50),NIF VARCHAR(50),USERBLOCKED TIMESTAMP,LASTPASSWORDUPDATE TIMESTAMP DEFAULT CURRENT_TIMESTAMP,FIRSTLOGIN BOOLEAN DEFAULT TRUE)
...
CREATE MEMORY TABLE PUBLIC.TUSER_ROLE(ID_USER_ROLE INTEGER GENERATED BY DEFAULT AS IDENTITY(START WITH 0) NOT NULL PRIMARY KEY,ID_ROLENAME INTEGER,USER_ VARCHAR(50),CONSTRAINT FK_TUSER FOREIGN KEY(USER_) REFERENCES PUBLIC.TUSER(USER_),CONSTRAINT FK_TROLE FOREIGN KEY(ID_ROLENAME) REFERENCES PUBLIC.TROLE(ID_ROLENAME))
ALTER TABLE PUBLIC.TUSER_ROLE ALTER COLUMN ID_USER_ROLE RESTART WITH 1
...
CREATE MEMORY TABLE PUBLIC.TUSER_PREFERENCE(ID_USER_PREFERENCE INTEGER GENERATED BY DEFAULT AS IDENTITY(START WITH 0) NOT NULL PRIMARY KEY,PREFERENCE_NAME VARCHAR(150),USER_LOGIN VARCHAR(150),PREFERENCE_VALUE VARCHAR(16777216))
ALTER TABLE PUBLIC.TUSER_PREFERENCE ALTER COLUMN ID_USER_PREFERENCE RESTART WITH 1
...
INSERT INTO TUSER VALUES('demo','demouser','demo','demo',NULL,'44460713B',NULL,NULL,NULL)
...
INSERT INTO TUSER_ROLE VALUES(0,0,'demo')
...
INSERT INTO TSERVER_PERMISSION VALUES(0,'com.ontimize.jee.common.services.user.IUserInformationService/getUserInformation')
...
INSERT INTO TUSER_PREFERENCE VALUES(0,'user_preference','demo','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')
...
INSERT INTO TROLE_SERVER_PERMISSION VALUES(0,0,0)
...

Testing

In order to call the REST API of the application, we must first log in using the Keycloak authentication user interface, capture the returned token, and then provide it in the authentication header of the http request.

To test this functionality we will use the Swagger tool deployed with the application, but we need to change the authentication settings on the OpenAPI declaration file.

Modify openapi-rest.yml

In the openapi-rest.yml we need to change the security settings to use OAuth2, replacing the previous BasicAuth properties (More information in this link and in this link):

openapi-rest.yml

components:
  ...
  securitySchemes:
    OAuth2:
      type: oauth2
      flows:
        implicit:
          authorizationUrl: http://localhost:8082/realms/demo/protocol/openid-connect/auth
          scopes: {}
security:
  - OAuth2: []
...

Once we have built and launched the project, we can access to the application opening a web browser and going to http://localhost:33333):

keycloak_swagger_1.png

We must open the authorization dialog by clicking on the Authorize button, provide the client and click on the Authorize button.

keycloak_swagger_2.png

If there is not exists a previous Keycloak session, a new tab will be opened requesting then credentials to login.

keycloak_swagger_3.png

Once the login process has been completed, it will return to the authorization dialog, showing the result of the authorization process.

keycloak_swagger_4.png

Now, we can close the authorization dialog and test the API.

keycloak_swagger_5.png