SSO: Wire Harbor → Keycloak OIDC #338
Labels
No labels
domain:backend
domain:devops
domain:frontend
status:approved
status:in-progress
status:needs-fix
status:qa
type:bug
type:devops
type:feature
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
ldraney/pal-e-platform#338
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Type
Feature
Lineage
Standalone — scoped during platform SSO initiative (2026-05-04). Depends on platform realm ticket.
Repo
forgejo_admin/pal-e-platformUser Story
As a platform admin
I want to access my container registry via SSO
So that I can manage images without a separate Harbor login
Context
Harbor supports OIDC auth natively. Configuration is done via Harbor's system settings (admin API or Helm values). The OIDC provider URL points to the Keycloak platform realm. Harbor maps OIDC groups to Harbor roles.
File Targets
Files the agent should modify or create:
terraform/modules/harbor/main.tf— add OIDC auth config to Harbor Helm valuesFiles the agent should NOT touch:
terraform/modules/keycloak/main.tf— realm managed separatelyAcceptance Criteria
Test Expectations
curl -s https://harbor.tail5b443a.ts.net/api/v2.0/health | jq .Constraints
Checklist
Related
project-pal-e-platform— platform project