Skip to content

Identity Config 0.14.0 to 0.14.1

These notes preserve manual upgrade steps from older UDS Identity Config versions. Use them when supporting an older UDS Core deployment that may have skipped a historical Keycloak realm change.

UDS Core v0.42.0 switched Keycloak to ambient mode. In AWS environments that use shared address space from RFC 6598, this could cause HTTP 403 responses unless the realm’s Require SSL option was set to None.

To update Require SSL manually:

  1. Navigate to the uds realm.
  2. Go to Realm settings > General.
  3. Set Require SSL to None.

v0.14.0+: Dynamic Client Registration removal

Section titled “v0.14.0+: Dynamic Client Registration removal”

UDS Identity Config v0.14.0 removed Dynamic Client Registration. Existing deployments needed to remove old trusted hosts and add a max-clients policy that blocks authenticated client registration.

To remove old trusted hosts:

  1. Navigate to the uds realm.
  2. Go to Clients > Client registration > Trusted hosts.
  3. Remove these trusted hosts:
    • *.keycloak.svc.cluster.local
    • *.pepr-uds-core-watcher.pepr-system.svc.cluster.local
    • 127.0.0.6
  4. Click Save.

To add the max-clients policy:

  1. Go to Clients > Client registration.
  2. Click Create client policy.
  3. Select max-clients.
  4. Set Name to max number of clients.
  5. Set Max Clients Per Realm to 0.
  6. Click Save.

UDS Core v0.41.0 fixed a critical FIPS mode issue in Keycloak. Earlier deployments could start Keycloak without FIPS restrictions because Bouncy Castle FIPS libraries were missing. Enabling FIPS mode changes password and hashing behavior:

  • Passwords must be at least 14 characters long, including database credentials and user passwords.
  • The argon2 hashing algorithm is not available in FIPS mode.
  • Existing systems must migrate user credentials to pbkdf2-sha512 before enabling FIPS mode in the master realm.

To prepare the administrator account for FIPS mode:

  1. Log in to Keycloak with the administrator account. If needed, use uds zarf connect keycloak.
  2. In the master realm, go to Authentication > Policies > Password policy.
  3. Click Add policy.
  4. Select Hashing algorithm and set it to pbkdf2-sha512.
  5. Click Save.
  6. Go to Users and select the administrator account.
  7. Open the Credentials tab and click Reset password.
  8. Enter a password of at least 14 characters. You can reuse the existing password if it meets the policy.
  9. Set Temporary to Off.
  10. Click Save.
  11. Return to the user’s Credentials tab and click Show data.
  12. Confirm algorithm is set to pbkdf2-sha512.

For FIPS limitations, see Keycloak FIPS 140-2 support.