fix(nubus): Remove legacy UMC Keycloak client that was used for SAML connection with the Nubus portal

This commit is contained in:
Thorsten Roßner
2025-10-30 12:14:46 +01:00
parent 7aa717c050
commit 152221fa79
3 changed files with 39 additions and 44 deletions

View File

@@ -129,7 +129,7 @@ An overview of
- components that consume the LDAP service.
- The components access the LDAP using a component-specific LDAP search account.
- components using Univention Keycloak as an identity provider (IdP).
- The components should use OAuth2 / OIDC flows if not otherwise denoted.
- All components use OAuth2 / OIDC flows.
- All components have a client configured in Keycloak.
Some components trust others to handle authentication for them.
@@ -148,7 +148,7 @@ flowchart TD
D-->K
O-->K
X-->K
P-->|SAML|K
P-->K
E[Element]-->K
J[Jitsi]-->K
I[IntercomService]-->K
@@ -184,11 +184,6 @@ sequenceDiagram
Note over Browser: User is authenticated
```
> [!note]
> Nubus' Portal and UMC still use [SAML 2.0](https://www.oasis-open.org/standard/saml/) to authenticate
> users. However, Nubus will switch to OIDC in an upcoming release, eliminating the use of SAML in openDesk
> altogether.
## Keycloak
[Keycloak](https://www.keycloak.org/) is an open-source identity and access management solution for web based applications and services. It provides features such as single sign-on, multi-factor authentication, user federation, and centralized user management.