Identity Config 0.14.0 to 0.14.1
These notes preserve manual upgrade steps from older UDS Identity Config versions. Use them when supporting an older UDS Core deployment that may have skipped a historical Keycloak realm change.
v0.14.1+: ambient mode SSL setting
Section titled “v0.14.1+: ambient mode SSL setting”UDS Core v0.42.0 switched Keycloak to ambient mode. In AWS environments that use shared address space from RFC 6598, this could cause HTTP 403 responses unless the realm’s Require SSL option was set to None.
To update Require SSL manually:
- Navigate to the
udsrealm. - Go to Realm settings > General.
- Set Require SSL to None.
v0.14.0+: Dynamic Client Registration removal
Section titled “v0.14.0+: Dynamic Client Registration removal”UDS Identity Config v0.14.0 removed Dynamic Client Registration. Existing deployments needed to remove old trusted hosts and add a max-clients policy that blocks authenticated client registration.
To remove old trusted hosts:
- Navigate to the
udsrealm. - Go to Clients > Client registration > Trusted hosts.
- Remove these trusted hosts:
*.keycloak.svc.cluster.local*.pepr-uds-core-watcher.pepr-system.svc.cluster.local127.0.0.6
- Click Save.
To add the max-clients policy:
- Go to Clients > Client registration.
- Click Create client policy.
- Select max-clients.
- Set Name to
max number of clients. - Set Max Clients Per Realm to
0. - Click Save.
FIPS preparation
Section titled “FIPS preparation”UDS Core v0.41.0 fixed a critical FIPS mode issue in Keycloak. Earlier deployments could start Keycloak without FIPS restrictions because Bouncy Castle FIPS libraries were missing. Enabling FIPS mode changes password and hashing behavior:
- Passwords must be at least 14 characters long, including database credentials and user passwords.
- The
argon2hashing algorithm is not available in FIPS mode. - Existing systems must migrate user credentials to
pbkdf2-sha512before enabling FIPS mode in themasterrealm.
To prepare the administrator account for FIPS mode:
- Log in to Keycloak with the administrator account. If needed, use
uds zarf connect keycloak. - In the
masterrealm, go to Authentication > Policies > Password policy. - Click Add policy.
- Select Hashing algorithm and set it to
pbkdf2-sha512. - Click Save.
- Go to Users and select the administrator account.
- Open the Credentials tab and click Reset password.
- Enter a password of at least 14 characters. You can reuse the existing password if it meets the policy.
- Set Temporary to Off.
- Click Save.
- Return to the user’s Credentials tab and click Show data.
- Confirm
algorithmis set topbkdf2-sha512.
For FIPS limitations, see Keycloak FIPS 140-2 support.
Related documentation
Section titled “Related documentation”- Legacy upgrade notes - preserved manual steps for older Identity Config versions
- Upgrade to FIPS 140-2 mode - current FIPS upgrade guidance