Group Mapper Args
Allows for creating and managing group mappers for Keycloak users federated via LDAP. The LDAP group mapper can be used to map an LDAP user's groups from some DN to Keycloak groups. This group mapper will also create the groups within Keycloak if they do not already exist.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as keycloak from "@pulumi/keycloak";
const realm = new keycloak.Realm("realm", {
realm: "my-realm",
enabled: true,
});
const ldapUserFederation = new keycloak.ldap.UserFederation("ldap_user_federation", {
name: "openldap",
realmId: realm.id,
usernameLdapAttribute: "cn",
rdnLdapAttribute: "cn",
uuidLdapAttribute: "entryDN",
userObjectClasses: [
"simpleSecurityObject",
"organizationalRole",
],
connectionUrl: "ldap://openldap",
usersDn: "dc=example,dc=org",
bindDn: "cn=admin,dc=example,dc=org",
bindCredential: "admin",
});
const ldapGroupMapper = new keycloak.ldap.GroupMapper("ldap_group_mapper", {
realmId: realm.id,
ldapUserFederationId: ldapUserFederation.id,
name: "group-mapper",
ldapGroupsDn: "dc=example,dc=org",
groupNameLdapAttribute: "cn",
groupObjectClasses: ["groupOfNames"],
membershipAttributeType: "DN",
membershipLdapAttribute: "member",
membershipUserLdapAttribute: "cn",
memberofLdapAttribute: "memberOf",
});
import pulumi
import pulumi_keycloak as keycloak
realm = keycloak.Realm("realm",
realm="my-realm",
enabled=True)
ldap_user_federation = keycloak.ldap.UserFederation("ldap_user_federation",
name="openldap",
realm_id=realm.id,
username_ldap_attribute="cn",
rdn_ldap_attribute="cn",
uuid_ldap_attribute="entryDN",
user_object_classes=[
"simpleSecurityObject",
"organizationalRole",
],
connection_url="ldap://openldap",
users_dn="dc=example,dc=org",
bind_dn="cn=admin,dc=example,dc=org",
bind_credential="admin")
ldap_group_mapper = keycloak.ldap.GroupMapper("ldap_group_mapper",
realm_id=realm.id,
ldap_user_federation_id=ldap_user_federation.id,
name="group-mapper",
ldap_groups_dn="dc=example,dc=org",
group_name_ldap_attribute="cn",
group_object_classes=["groupOfNames"],
membership_attribute_type="DN",
membership_ldap_attribute="member",
membership_user_ldap_attribute="cn",
memberof_ldap_attribute="memberOf")
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Keycloak = Pulumi.Keycloak;
return await Deployment.RunAsync(() =>
{
var realm = new Keycloak.Realm("realm", new()
{
RealmName = "my-realm",
Enabled = true,
});
var ldapUserFederation = new Keycloak.Ldap.UserFederation("ldap_user_federation", new()
{
Name = "openldap",
RealmId = realm.Id,
UsernameLdapAttribute = "cn",
RdnLdapAttribute = "cn",
UuidLdapAttribute = "entryDN",
UserObjectClasses = new[]
{
"simpleSecurityObject",
"organizationalRole",
},
ConnectionUrl = "ldap://openldap",
UsersDn = "dc=example,dc=org",
BindDn = "cn=admin,dc=example,dc=org",
BindCredential = "admin",
});
var ldapGroupMapper = new Keycloak.Ldap.GroupMapper("ldap_group_mapper", new()
{
RealmId = realm.Id,
LdapUserFederationId = ldapUserFederation.Id,
Name = "group-mapper",
LdapGroupsDn = "dc=example,dc=org",
GroupNameLdapAttribute = "cn",
GroupObjectClasses = new[]
{
"groupOfNames",
},
MembershipAttributeType = "DN",
MembershipLdapAttribute = "member",
MembershipUserLdapAttribute = "cn",
MemberofLdapAttribute = "memberOf",
});
});
package main
import (
"github.com/pulumi/pulumi-keycloak/sdk/v6/go/keycloak"
"github.com/pulumi/pulumi-keycloak/sdk/v6/go/keycloak/ldap"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
realm, err := keycloak.NewRealm(ctx, "realm", &keycloak.RealmArgs{
Realm: pulumi.String("my-realm"),
Enabled: pulumi.Bool(true),
})
if err != nil {
return err
}
ldapUserFederation, err := ldap.NewUserFederation(ctx, "ldap_user_federation", &ldap.UserFederationArgs{
Name: pulumi.String("openldap"),
RealmId: realm.ID(),
UsernameLdapAttribute: pulumi.String("cn"),
RdnLdapAttribute: pulumi.String("cn"),
UuidLdapAttribute: pulumi.String("entryDN"),
UserObjectClasses: pulumi.StringArray{
pulumi.String("simpleSecurityObject"),
pulumi.String("organizationalRole"),
},
ConnectionUrl: pulumi.String("ldap://openldap"),
UsersDn: pulumi.String("dc=example,dc=org"),
BindDn: pulumi.String("cn=admin,dc=example,dc=org"),
BindCredential: pulumi.String("admin"),
})
if err != nil {
return err
}
_, err = ldap.NewGroupMapper(ctx, "ldap_group_mapper", &ldap.GroupMapperArgs{
RealmId: realm.ID(),
LdapUserFederationId: ldapUserFederation.ID(),
Name: pulumi.String("group-mapper"),
LdapGroupsDn: pulumi.String("dc=example,dc=org"),
GroupNameLdapAttribute: pulumi.String("cn"),
GroupObjectClasses: pulumi.StringArray{
pulumi.String("groupOfNames"),
},
MembershipAttributeType: pulumi.String("DN"),
MembershipLdapAttribute: pulumi.String("member"),
MembershipUserLdapAttribute: pulumi.String("cn"),
MemberofLdapAttribute: pulumi.String("memberOf"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.keycloak.Realm;
import com.pulumi.keycloak.RealmArgs;
import com.pulumi.keycloak.ldap.UserFederation;
import com.pulumi.keycloak.ldap.UserFederationArgs;
import com.pulumi.keycloak.ldap.GroupMapper;
import com.pulumi.keycloak.ldap.GroupMapperArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var realm = new Realm("realm", RealmArgs.builder()
.realm("my-realm")
.enabled(true)
.build());
var ldapUserFederation = new UserFederation("ldapUserFederation", UserFederationArgs.builder()
.name("openldap")
.realmId(realm.id())
.usernameLdapAttribute("cn")
.rdnLdapAttribute("cn")
.uuidLdapAttribute("entryDN")
.userObjectClasses(
"simpleSecurityObject",
"organizationalRole")
.connectionUrl("ldap://openldap")
.usersDn("dc=example,dc=org")
.bindDn("cn=admin,dc=example,dc=org")
.bindCredential("admin")
.build());
var ldapGroupMapper = new GroupMapper("ldapGroupMapper", GroupMapperArgs.builder()
.realmId(realm.id())
.ldapUserFederationId(ldapUserFederation.id())
.name("group-mapper")
.ldapGroupsDn("dc=example,dc=org")
.groupNameLdapAttribute("cn")
.groupObjectClasses("groupOfNames")
.membershipAttributeType("DN")
.membershipLdapAttribute("member")
.membershipUserLdapAttribute("cn")
.memberofLdapAttribute("memberOf")
.build());
}
}
resources:
realm:
type: keycloak:Realm
properties:
realm: my-realm
enabled: true
ldapUserFederation:
type: keycloak:ldap:UserFederation
name: ldap_user_federation
properties:
name: openldap
realmId: ${realm.id}
usernameLdapAttribute: cn
rdnLdapAttribute: cn
uuidLdapAttribute: entryDN
userObjectClasses:
- simpleSecurityObject
- organizationalRole
connectionUrl: ldap://openldap
usersDn: dc=example,dc=org
bindDn: cn=admin,dc=example,dc=org
bindCredential: admin
ldapGroupMapper:
type: keycloak:ldap:GroupMapper
name: ldap_group_mapper
properties:
realmId: ${realm.id}
ldapUserFederationId: ${ldapUserFederation.id}
name: group-mapper
ldapGroupsDn: dc=example,dc=org
groupNameLdapAttribute: cn
groupObjectClasses:
- groupOfNames
membershipAttributeType: DN
membershipLdapAttribute: member
membershipUserLdapAttribute: cn
memberofLdapAttribute: memberOf
Import
LDAP mappers can be imported using the format {{realm_id}}/{{ldap_user_federation_id}}/{{ldap_mapper_id}}
. The ID of the LDAP user federation provider and the mapper can be found within the Keycloak GUI, and they are typically GUIDs. Example: bash
$ pulumi import keycloak:ldap/groupMapper:GroupMapper ldap_group_mapper my-realm/af2a6ca3-e4d7-49c3-b08b-1b3c70b4b860/3d923ece-1a91-4bf7-adaf-3b82f2a12b67
Constructors
Properties
When true
, groups that no longer exist within LDAP will be dropped in Keycloak during sync. Defaults to false
.
The name of the LDAP attribute that is used in group objects for the name and RDN of the group. Typically cn
.
List of strings representing the object classes for the group. Must contain at least one.
When specified, adds a custom filter to be used when querying for groups. Must start with (
and end with )
.
Keycloak group path the LDAP groups are added to. For example if value /Applications/App1
is used, then LDAP groups will be available in Keycloak under group App1
, which is the child of top level group Applications
. The configured group path must already exist in Keycloak when creating this mapper.
When true
, missing groups in the hierarchy will be ignored.
The LDAP DN where groups can be found.
The ID of the LDAP user federation provider to attach this mapper to.
Array of strings representing attributes on the LDAP group which will be mapped to attributes on the Keycloak group.
Specifies the name of the LDAP attribute on the LDAP user that contains the groups the user is a member of. Defaults to memberOf
.
Can be one of DN
or UID
. Defaults to DN
.
The name of the LDAP attribute that is used for membership mappings.
The name of the LDAP attribute on a user that is used for membership mappings.
When true
, group inheritance will be propagated from LDAP to Keycloak. When false
, all LDAP groups will be propagated as top level groups within Keycloak.
Can be one of LOAD_GROUPS_BY_MEMBER_ATTRIBUTE
, GET_GROUPS_FROM_USER_MEMBEROF_ATTRIBUTE
, or LOAD_GROUPS_BY_MEMBER_ATTRIBUTE_RECURSIVELY
. Defaults to LOAD_GROUPS_BY_MEMBER_ATTRIBUTE
.