A client to interact with Keycloak's Administration API
npm install @keycloak/keycloak-admin-client- TypeScript supported
- Latest Keycloak version supported
- Complete resource definitions
- Well-tested for supported APIs
``sh`
npm install @keycloak/keycloak-admin-client
`js
import KcAdminClient from '@keycloak/keycloak-admin-client';
// To configure the client, pass an object to override any of these options:
// {
// baseUrl: 'http://127.0.0.1:8080',
// realmName: 'master',
// requestOptions: {
// / Fetch request options https://developer.mozilla.org/en-US/docs/Web/API/fetch#options /
// },
// }
const kcAdminClient = new KcAdminClient();
// Authorize with username / password
await kcAdminClient.auth({
username: 'admin',
password: 'admin',
grantType: 'password',
clientId: 'admin-cli',
totp: '123456', // optional Time-based One-time Password if OTP is required in authentication flow
});
// List first page of users
const users = await kcAdminClient.users.find({ first: 0, max: 10 });
// find users by attributes
const users = await kcAdminClient.users.find({ q: "phone:123" });
// Override client configuration for all further requests:
kcAdminClient.setConfig({
realmName: 'another-realm',
});
// This operation will now be performed in 'another-realm' if the user has access.
const groups = await kcAdminClient.groups.find();
// Set a realm property to override the realm for only a single operation.`
// For example, creating a user in another realm:
await kcAdminClient.users.create({
realm: 'a-third-realm',
username: 'username',
email: 'user@example.com',
});
To refresh the access token provided by Keycloak, an OpenID client like panva/node-openid-client can be used like this:
`js
import {Issuer} from 'openid-client';
const keycloakIssuer = await Issuer.discover(
'http://localhost:8080/realms/master',
);
const client = new keycloakIssuer.Client({
client_id: 'admin-cli', // Same as clientId passed to client.auth()
token_endpoint_auth_method: 'none', // to send only client_id in the header
});
// Use the grant type 'password'
let tokenSet = await client.grant({
grant_type: 'password',
username: 'admin',
password: 'admin',
});
// Periodically using refresh_token grant flow to get new access token here
setInterval(async () => {
const refreshToken = tokenSet.refresh_token;
tokenSet = await client.refresh(refreshToken);
kcAdminClient.setAccessToken(tokenSet.access_token);
}, 58 * 1000); // 58 seconds
`
In cases where you don't have a refresh token, eg. in a client credentials flow, you can simply call kcAdminClient.auth to get a new access token, like this:
`js
const credentials = {
grantType: 'client_credentials',
clientId: 'clientId',
clientSecret: 'some-client-secret-uuid',
};
await kcAdminClient.auth(credentials);
setInterval(() => kcAdminClient.auth(credentials), 58 * 1000); // 58 seconds
`
To build the source do a build:
`bash`
pnpm build
Start the Keycloak server in development mode using port 8180. See the instructions in the Keycloak server app.
`bash`
cd ../../apps/keycloak-server
pnpm start --http-port 8180
If you started your container manually make sure there is an admin user named admin with password admin, the server is started in development mode using port 8180 and the required features are enabled.
`bash`
./kc.sh start-dev --http-port 8180 --features transient-users,oid4vc-vci,declarative-ui,quick-theme,spiffe,kubernetes-service-accounts,workflows,client-auth-federated,jwt-authorization-grant
Then start the tests with:
`bash`
pnpm test
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/realms.spec.ts
- Import a realm from a full representation of that realm (POST /)GET /{realm}
- Get the top-level representation of the realm ()PUT /{realm}
- Update the top-level information of the realm ()DELETE /{realm}
- Delete the realm ()POST /{realm}/partial-export
- Partial export of existing realm into a JSON file ()GET /{realm}/users-management-permissions
- Get users management permissions ()PUT /{realm}/users-management-permissions
- Enable users management permissions ()GET /{realm}/events
- Get events ()GET /{realm}/admin-events
- Get admin events ()POST /{realm}/logout-all
- Remove all user sessions ()DELETE /{realm}/sessions/{session}
- Remove a specific user session ()GET /{realm}/client-policies/policies
- Get client policies policies ()PUT /{realm}/client-policies/policies
- Update client policies policies ()GET /{realm}/client-policies/profiles
- Get client policies profiles ()PUT /{realm}/client-policies/profiles
- Update client policies profiles ()GET /{realm}/group-by-path/{path}
- Get a group by path ()$3
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/roles.spec.ts
- Create a new role for the realm (POST /{realm}/roles)GET /{realm}/roles
- Get all roles for the realm ()GET /{realm}/roles/{role-name}
- Get a role by name ()PUT /{realm}/roles/{role-name}
- Update a role by name ()DELETE /{realm}/roles/{role-name}
- Delete a role by name ()GET /{realm}/roles/{role-name}/users
- Get all users in a role by name for the realm ()
- Get a specific role (GET /{realm}/roles-by-id/{role-id})PUT /{realm}/roles-by-id/{role-id}
- Update the role ()DELETE /{realm}/roles-by-id/{role-id}
- Delete the role ()POST /{realm}/roles-by-id/{role-id}/composites
- Make the role a composite role by associating some child roles()GET /{realm}/roles-by-id/{role-id}/composites
- Get role’s children Returns a set of role’s children provided the role is a composite. ()DELETE /{realm}/roles-by-id/{role-id}/composites
- Remove a set of roles from the role’s composite ()GET /{realm}/roles-by-id/{role-id}/composites/clients/{client}
- Get client-level roles for the client that are in the role’s composite ()GET /{realm}/roles-by-id/{role-id}/composites/realm
- Get realm-level roles that are in the role’s composite ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/users.spec.ts
- Create a new user (POST /{realm}/users)GET /{realm}/users
- Get users Returns a list of users, filtered according to query parameters ()GET /{realm}/users/{id}
- Get representation of the user ()PUT /{realm}/users/{id}
- Update the user ()DELETE /{realm}/users/{id}
- Delete the user ()GET /{realm}/users/count
- Count users ()PUT /{realm}/users/{id}/execute-actions-email
- Send a update account email to the user An email contains a link the user can click to perform a set of required actions. ()GET /{realm}/users/{id}/groups
- Get user groups ()PUT /{realm}/users/{id}/groups/{groupId}
- Add user to group ()DELETE /{realm}/users/{id}/groups/{groupId}
- Delete user from group ()PUT /{realm}/users/{id}/remove-totp
- Remove TOTP from the user ()PUT /{realm}/users/{id}/reset-password
- Set up a temporary password for the user User will have to reset the temporary password next time they log in. ()PUT /{realm}/users/{id}/send-verify-email
- Send an email-verification email to the user An email contains a link the user can click to verify their email address. ()PUT /{realm}/users/{id}/credentials/{credentialId}/userLabel
- Update a credential label for a user ()POST /{realm}/users/{id}/credentials/{credentialId}/moveAfter/{newPreviousCredentialId}
- Move a credential to a position behind another credential ()PUT /{realm}/users/{id}/credentials/{credentialId}/moveToFirst
- Move a credential to a first position in the credentials list of the user ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/users.spec.ts#L178
- Add user to group (PUT /{id}/groups/{groupId})GET /{id}/groups
- List all user groups ()GET /{id}/groups/count
- Count user groups ()DELETE /{id}/groups/{groupId}
- Remove user from group ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/users.spec.ts#L352
- Get user role-mappings (GET /{realm}/users/{id}/role-mappings)POST /{realm}/users/{id}/role-mappings/realm
- Add realm-level role mappings to the user ()GET /{realm}/users/{id}/role-mappings/realm
- Get realm-level role mappings ()DELETE /{realm}/users/{id}/role-mappings/realm
- Delete realm-level role mappings ()GET /{realm}/users/{id}/role-mappings/realm/available
- Get realm-level roles that can be mapped ()GET /{realm}/users/{id}/role-mappings/realm/composite
- Get effective realm-level role mappings This will recurse all composite roles to get the result. ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/groups.spec.ts
- Create (POST /{realm}/groups)GET /{realm}/groups
- List ()GET /{realm}/groups/{id}
- Get one ()PUT /{realm}/groups/{id}
- Update ()DELETE /{realm}/groups/{id}
- Delete ()GET /{realm}/groups/count
- Count ()GET /{realm}/groups/{id}/members
- List members ()POST /{realm}/groups/{id}/children
- Set or create child ()GET /{realm}/groups/{id}/children
- Get children ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/groups.spec.ts#L103
- Get group role-mappings (GET /{realm}/groups/{id}/role-mappings)POST /{realm}/groups/{id}/role-mappings/realm
- Add realm-level role mappings to the group ()GET /{realm}/groups/{id}/role-mappings/realm
- Get realm-level role mappings ()DELETE /{realm}/groups/{id}/role-mappings/realm
- Delete realm-level role mappings ()GET /{realm}/groups/{id}/role-mappings/realm/available
- Get realm-level roles that can be mapped ()GET /{realm}/groups/{id}/role-mappings/realm/composite
- Get effective realm-level role mappings This will recurse all composite roles to get the result. ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clients.spec.ts
- Create a new client (POST /{realm}/clients)GET /{realm}/clients
- Get clients belonging to the realm ()GET /{realm}/clients/{id}
- Get representation of the client ()PUT /{realm}/clients/{id}
- Update the client ()DELETE /{realm}/clients/{id}
- Delete the client ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clients.spec.ts
- Create a new role for the client (POST /{realm}/clients/{id}/roles)GET /{realm}/clients/{id}/roles
- Get all roles for the client ()GET /{realm}/clients/{id}/roles/{role-name}
- Get a role by name ()PUT /{realm}/clients/{id}/roles/{role-name}
- Update a role by name ()DELETE /{realm}/clients/{id}/roles/{role-name}
- Delete a role by name ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/groups.spec.ts#L192
- Add client-level roles to the group role mapping (POST /{realm}/groups/{id}/role-mappings/clients/{client})GET /{realm}/groups/{id}/role-mappings/clients/{client}
- Get client-level role mappings for the group ()DELETE /{realm}/groups/{id}/role-mappings/clients/{client}
- Delete client-level roles from group role mapping ()GET /{realm}/groups/{id}/role-mappings/clients/{client}/available
- Get available client-level roles that can be mapped to the group ()GET /{realm}/groups/{id}/role-mappings/clients/{client}/composite
- Get effective client-level role mappings This will recurse all composite roles to get the result. ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/users.spec.ts#L352
- Add client-level roles to the user role mapping (POST /{realm}/users/{id}/role-mappings/clients/{client})GET /{realm}/users/{id}/role-mappings/clients/{client}
- Get client-level role mappings for the user ()DELETE /{realm}/users/{id}/role-mappings/clients/{client}
- Delete client-level roles from user role mapping ()GET /{realm}/users/{id}/role-mappings/clients/{client}/available
- Get available client-level roles that can be mapped to the user ()GET /{realm}/users/{id}/role-mappings/clients/{client}/composite
- Get effective client-level role mappings This will recurse all composite roles to get the result. ()
- Get key info (GET /{realm}/clients/{id}/certificates/{attr})POST /{realm}/clients/{id}/certificates/{attr}/download
- Get a keystore file for the client, containing private key and public certificate ()POST /{realm}/clients/{id}/certificates/{attr}/generate
- Generate a new certificate with new key pair ()POST /{realm}/clients/{id}/certificates/{attr}/generate-and-download
- Generate a new keypair and certificate, and get the private key file Generates a keypair and certificate and serves the private key in a specified keystore format. ()POST /{realm}/clients/{id}/certificates/{attr}/upload
- Upload certificate and eventually private key ()POST /{realm}/clients/{id}/certificates/{attr}/upload-certificate
- Upload only certificate, not private key ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/idp.spec.ts
- Create a new identity provider (POST /{realm}/identity-provider/instances)GET /{realm}/identity-provider/instances
- Get identity providers ()GET /{realm}/identity-provider/instances/{alias}
- Get the identity provider ()PUT /{realm}/identity-provider/instances/{alias}
- Update the identity provider ()DELETE /{realm}/identity-provider/instances/{alias}
- Delete the identity provider ()GET /{realm}/identity-provider/providers/{providerId}
- Find identity provider factory ()POST /{realm}/identity-provider/instances/{alias}/mappers
- Create a new identity provider mapper ()GET /{realm}/identity-provider/instances/{alias}/mappers
- Get identity provider mappers ()GET /{realm}/identity-provider/instances/{alias}/mappers/{id}
- Get the identity provider mapper ()PUT /{realm}/identity-provider/instances/{alias}/mappers/{id}
- Update the identity provider mapper ()DELETE /{realm}/identity-provider/instances/{alias}/mappers/{id}
- Delete the identity provider mapper ()GET /{realm}/identity-provider/instances/{alias}/mapper-types
- Find the identity provider mapper types ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clientScopes.spec.ts
- Create a new client scope (POST /{realm}/client-scopes)GET /{realm}/client-scopes
- Get client scopes belonging to the realm ()GET /{realm}/client-scopes/{id}
- Get representation of the client scope ()PUT /{realm}/client-scopes/{id}
- Update the client scope ()DELETE /{realm}/client-scopes/{id}
- Delete the client scope ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clientScopes.spec.ts
- Get realm default client scopes (GET /{realm}/default-default-client-scopes)PUT /{realm}/default-default-client-scopes/{id}
- Add realm default client scope ()DELETE /{realm}/default-default-client-scopes/{id}
- Delete realm default client scope ()GET /{realm}/default-optional-client-scopes
- Get realm optional client scopes ()PUT /{realm}/default-optional-client-scopes/{id}
- Add realm optional client scope ()DELETE /{realm}/default-optional-client-scopes/{id}
- Delete realm optional client scope ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clientScopes.spec.ts
- Get default client scopes (GET /{realm}/clients/{id}/default-client-scopes)PUT /{realm}/clients/{id}/default-client-scopes/{clientScopeId}
- Add default client scope ()DELETE /{realm}/clients/{id}/default-client-scopes/{clientScopeId}
- Delete default client scope ()GET /{realm}/clients/{id}/optional-client-scopes
- Get optional client scopes ()PUT /{realm}/clients/{id}/optional-client-scopes/{clientScopeId}
- Add optional client scope ()DELETE /{realm}/clients/{id}/optional-client-scopes/{clientScopeId}
- Delete optional client scope ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clientScopes.spec.ts
- Get all scope mappings for the client (GET /{realm}/client-scopes/{id}/scope-mappings)POST /{realm}/client-scopes/{id}/scope-mappings/clients/{client}
- Add client-level roles to the client’s scope ()GET /{realm}/client-scopes/{id}/scope-mappings/clients/{client}
- Get the roles associated with a client’s scope ()GET /{realm}/client-scopes/{id}/scope-mappings/clients/{client}/available
- The available client-level roles ()GET /{realm}/client-scopes/{id}/scope-mappings/clients/{client}/composite
- Get effective client roles ()DELETE /{realm}/client-scopes/{id}/scope-mappings/clients/{client}
- Remove client-level roles from the client’s scope. ()POST /{realm}/client-scopes/{id}/scope-mappings/realm
- Add a set of realm-level roles to the client’s scope ()GET /{realm}/client-scopes/{id}/scope-mappings/realm
- Get realm-level roles associated with the client’s scope ()DELETE /{realm}/client-scopes/{id}/scope-mappings/realm
- Remove a set of realm-level roles from the client’s scope ()GET /{realm}/client-scopes/{id}/scope-mappings/realm/available
- Get realm-level roles that are available to attach to this client’s scope ()GET /{realm}/client-scopes/{id}/scope-mappings/realm/composite
- Get effective realm-level roles associated with the client’s scope ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clientScopes.spec.ts
- Get all scope mappings for the client (GET /{realm}/clients/{id}/scope-mappings)POST /{realm}/clients/{id}/scope-mappings/clients/{client}
- Add client-level roles to the client’s scope ()GET /{realm}/clients/{id}/scope-mappings/clients/{client}
- Get the roles associated with a client’s scope ()DELETE /{realm}/clients/{id}/scope-mappings/clients/{client}
- Remove client-level roles from the client’s scope. ()GET /{realm}/clients/{id}/scope-mappings/clients/{client}/available
- The available client-level roles ()GET /{realm}/clients/{id}/scope-mappings/clients/{client}/composite
- Get effective client roles ()POST /{realm}/clients/{id}/scope-mappings/realm
- Add a set of realm-level roles to the client’s scope ()GET /{realm}/clients/{id}/scope-mappings/realm
- Get realm-level roles associated with the client’s scope ()DELETE /{realm}/clients/{id}/scope-mappings/realm
- Remove a set of realm-level roles from the client’s scope ()GET /{realm}/clients/{id}/scope-mappings/realm/available
- Get realm-level roles that are available to attach to this client’s scope ()GET /{realm}/clients/{id}/scope-mappings/realm/composite
- Get effective realm-level roles associated with the client’s scope ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clientScopes.spec.ts
- Create multiple mappers (POST /{realm}/client-scopes/{id}/protocol-mappers/add-models)POST /{realm}/client-scopes/{id}/protocol-mappers/models
- Create a mapper ()GET /{realm}/client-scopes/{id}/protocol-mappers/models
- Get mappers ()GET /{realm}/client-scopes/{id}/protocol-mappers/models/{mapperId}
- Get mapper by id ()PUT /{realm}/client-scopes/{id}/protocol-mappers/models/{mapperId}
- Update the mapper ()DELETE /{realm}/client-scopes/{id}/protocol-mappers/models/{mapperId}
- Delete the mapper ()GET /{realm}/client-scopes/{id}/protocol-mappers/protocol/{protocol}
- Get mappers by name for a specific protocol ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clients.spec.ts
- Create multiple mappers (POST /{realm}/clients/{id}/protocol-mappers/add-models)POST /{realm}/clients/{id}/protocol-mappers/models
- Create a mapper ()GET /{realm}/clients/{id}/protocol-mappers/models
- Get mappers ()GET /{realm}/clients/{id}/protocol-mappers/models/{mapperId}
- Get mapper by id ()PUT /{realm}/clients/{id}/protocol-mappers/models/{mapperId}
- Update the mapper ()DELETE /{realm}/clients/{id}/protocol-mappers/models/{mapperId}
- Delete the mapper ()GET /{realm}/clients/{id}/protocol-mappers/protocol/{protocol}
- Get mappers by name for a specific protocol ()
Supported for user federation. Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/components.spec.ts
- Create (POST /{realm}/components)GET /{realm}/components
- List ()GET /{realm}/components/{id}
- Get ()PUT /{realm}/components/{id}
- Update ()DELETE /{realm}/components/{id}
- Delete ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clients.spec.ts
- List user sessions for a specific client (GET /{realm}/clients/{id}/user-sessions)GET /{realm}/clients/{id}/offline-sessions
- List offline sessions for a specific client ()GET /{realm}/clients/{id}/session-count
- Get user session count for a specific client ()GET /{realm}/clients/{id}/offline-session-count
- List offline session count for a specific client ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/authenticationManagement.spec.ts
- Register a new required action (POST /{realm}/authentication/register-required-action)GET /{realm}/authentication/required-actions
- Get required actions. Returns a list of required actions. ()GET /{realm}/authentication/required-actions/{alias}
- Get required action for alias ()PUT /{realm}/authentication/required-actions/{alias}
- Update required action ()DELETE /{realm}/authentication/required-actions/{alias}
- Delete required action ()POST /{realm}/authentication/required-actions/{alias}/lower-priority
- Lower required action’s priority ()POST /{realm}/authentication/required-actions/{alias}/raise-priority
- Raise required action’s priority ()GET /{realm}/authentication/unregistered-required-actions
- Get unregistered required actions Returns a list of unregistered required actions. ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clients.spec.ts
- Create permission (POST /{realm}/clients/{id}/authz/resource-server/permission/{type})GET /{realm}/clients/{id}/authz/resource-server/permission/{type}/{permissionId}
- Get permission ()PUT /{realm}/clients/{id}/authz/resource-server/permission/{type}/{permissionId}
- Update permission ()DELETE /{realm}/clients/{id}/authz/resource-server/permission/{type}/{permissionId}
- Delete permission ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/clients.spec.ts
- Create policy (POST /{realm}/clients/{id}/authz/resource-server/policy/{type})GET /{realm}/clients/{id}/authz/resource-server/policy/{type}/{policyId}
- Get policy ()GET /{realm}/clients/{id}/authz/resource-server/policy/search
- Get policy by name ()PUT /{realm}/clients/{id}/authz/resource-server/policy/{type}/{policyId}
- Update policy ()DELETE /{realm}/clients/{id}/authz/resource-server/policy/{policyId}
- Delete policy ()
Demo code: https://github.com/keycloak/keycloak/blob/main/js/libs/keycloak-admin-client/test/attackDetection.spec.ts
- Clear any user login failures for all users This can release temporary disabled users (DELETE /{realm}/attack-detection/brute-force/users)GET /{realm}/attack-detection/brute-force/users/{userId}
- Get status of a username in brute force detection ()DELETE /{realm}/attack-detection/brute-force/users/{userId}`)
- Clear any user login failures for the user This can release temporary disabled user (
- Authentication Management
- Client Initial Access
- Client Registration Policy
- Key
- User Storage Provider
This repo is originally developed by Canner and InfuseAI before being transferred under keycloak organization.