Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hardening for production #34

Open
john-gom opened this issue Jun 28, 2024 · 1 comment
Open

Hardening for production #34

john-gom opened this issue Jun 28, 2024 · 1 comment

Comments

@john-gom
Copy link
Collaborator

john-gom commented Jun 28, 2024

@john-gom
Copy link
Collaborator Author

Following through the list of items on https://www.keycloak.org/server/configuration-production:

  • TLS for secure communication. Based on this decision we will not do this: docs: Internal security .github#37
  • The hostname for Keycloak. Set through KC_HOSTNAME environment variable
  • Reverse proxy in a distributed environment. This will require configuration of the current nginx proxy
  • Limit the number of queued requests. Need to determine what the limits should be
  • Production grade database. Already using PostgreSQL
  • Support for Keycloak in a cluster. We are not doing this for other services at the moment so there would be no benefit in doing it for Keycloak
  • Configure Keycloak Server with IPv4 or IPv6. Not sure why this is needed. Seems unnecessary

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: In progress
Development

No branches or pull requests

2 participants