Configure Google OAuth IdP for IAM


The instruction below applies to the DNS-based management clusters. If you bootstrap a non-DNS-based management cluster, configure Google OAuth IdP for Keycloak after bootstrap using the official Keycloak documentation.

If you integrate Google OAuth external identity provider for IAM to Mirantis Container Cloud, create the authorization credentials for IAM in your Google OAuth account and configure cluster.yaml.template during the bootstrap of the management cluster.

To configure Google OAuth IdP for IAM:

  1. Create Google OAuth credentials for IAM:

    1. Log in to your

    2. Navigate to Credentials.

    3. In the APIs Credentials menu, select OAuth client ID.

    4. In the window that opens:

      1. In the Application type menu, select Web application.

      2. In the Authorized redirect URIs field, type in <keycloak-url>/auth/realms/iam/broker/google/endpoint, where <keycloak-url> is the corresponding DNS address.

      3. Press Enter to add the URI.

      4. Click Create.

      A page with your client ID and client secret opens. Save these credentials for further usage.

  2. Log in to the bootstrap node.

  3. Open cluster.yaml.template stored in the following locations depending on the cloud provider type:

    • Bare metal: templates/bm/cluster.yaml.template

    • OpenStack: templates/cluster.yaml.template

    • vSphere: templates/vsphere/cluster.yaml.template

  4. In the keycloak:externalIdP: section, add the following snippet with your credentials created in previous steps:

          enabled: true
            clientId: <Google_OAuth_client_ID>
            clientSecret: <Google_OAuth_client_secret>

Now, return to the bootstrap instruction depending on the provider type of your management cluster.