it was nice interaction with you at SC 24 conference , we are trying to test OOD with LSF container applications. I am running Apache ood on https and key cloak on http both are running, having some issues with integration on same node and network . shall I need to run both on https ,i am able to login to keycloak user with pwd but does not proxying. getting 403 error how can i get OOD dashboard if any technical support from your team to help me or zoom support to check configuration if any missing , let me know thanks
in Sudo vi /etc/ood/config/ood_portal.yml
OIDCProviderMetadataURL ‘http://fqdn:8080/realms/ood-realm/.well-known/openid-configuration’
OIDCClientID ‘ood-client’
OIDCClientSecret " ‘’
OIDCRedirectURI ‘https://fqdn:443/oidc/callback’. same in keycloak client configuration
sudo vi /etc/httpd/conf.d/ood-portal.conf
sudo vi /etc/httpd/conf.d/auth_openidc.conf
in **Sudo vi** **/etc/httpd/conf.d/ood-keycloak.conf** Proxy for Keycloak
ProxyPass /auth http://FQDN:8080/auth
ProxyPassReverse /auth http://fqdn:8080/auth
i have not done this sudo -u keycloak ./bin/jboss-cli.sh ‘embed-server,/subsystem=undertow/server=default-server/http-listener=default:write-attribute(name=proxy-address-forwarding,value=true)’
sudo -u keycloak ./bin/jboss-cli.sh ‘embed-server,/socket-binding-group=standard-sockets/socket-binding=proxy-https:add(port=443)’
sudo -u keycloak ./bin/jboss-cli.sh ‘embed-server,/subsystem=undertow/server=default-server/http-listener=default:write-attribute(name=redirect-socket,value=proxy-https)’
Have good day
Thanks