SSO: Wire MinIO → Keycloak OIDC #339
Labels
No labels
domain:backend
domain:devops
domain:frontend
status:approved
status:in-progress
status:needs-fix
status:qa
type:bug
type:devops
type:feature
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
ldraney/pal-e-platform#339
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Type
Feature
Lineage
Standalone — scoped during platform SSO initiative (2026-05-04). Depends on platform realm ticket.
Repo
forgejo_admin/pal-e-platformUser Story
As a platform admin
I want to access MinIO console via SSO
So that I can manage object storage without a separate login
Context
MinIO supports OpenID Connect natively. Configuration sets the OIDC provider URL, client ID/secret, and maps claims to MinIO policies. The console login will redirect to Keycloak and return with admin policy assigned.
File Targets
Files the agent should modify or create:
terraform/modules/storage/main.tf— add OIDC config to MinIO deployment or Helm valuesFiles the agent should NOT touch:
terraform/modules/keycloak/main.tf— realm managed separatelyAcceptance Criteria
Test Expectations
curl -s https://minio.tail5b443a.ts.net/minio/health/liveConstraints
Checklist
Related
project-pal-e-platform— platform project