read('Auth.User.id'); $userId = null; if ($userId) { return $this->_table->get($userId); } $raw_profile_payload = $profile->access_token->getJwt()->getPayload(); $user = $this->extractProfileData($raw_profile_payload); if (!$user) { throw new \RuntimeException('Unable to save new user'); } return $user; } private function extractProfileData($profile_payload) { $mapping = Configure::read('keycloak.mapping'); $fields = [ 'username' => 'preferred_username', 'email' => 'email', 'first_name' => 'given_name', 'last_name' => 'family_name' ]; foreach ($fields as $field => $default) { if (!empty($mapping[$field])) { $fields[$field] = $mapping[$field]; } } $user = [ 'individual' => [ 'email' => $profile_payload[$fields['email']], 'first_name' => $profile_payload[$fields['first_name']], 'last_name' => $profile_payload[$fields['last_name']] ], 'user' => [ 'username' => $profile_payload[$fields['username']], ], 'organisation' => [ 'uuid' => $profile_payload[$fields['org_uuid']], ], 'role' => [ 'name' => $profile_payload[$fields['role_name']], ] ]; //$user['user']['individual_id'] = $this->_table->captureIndividual($user); //$user['user']['role_id'] = $this->_table->captureRole($user); $existingUser = $this->_table->find()->where(['username' => $user['user']['username']])->first(); /* if (empty($existingUser)) { $user['user']['password'] = Security::randomString(16); $existingUser = $this->_table->newEntity($user['user']); if (!$this->_table->save($existingUser)) { return false; } } else { $dirty = false; if ($user['user']['individual_id'] != $existingUser['individual_id']) { $existingUser['individual_id'] = $user['user']['individual_id']; $dirty = true; } if ($user['user']['role_id'] != $existingUser['role_id']) { $existingUser['role_id'] = $user['user']['role_id']; $dirty = true; } $existingUser; if ($dirty) { if (!$this->_table->save($existingUser)) { return false; } } } */ return $existingUser; } /* * Run a rest query against keycloak * Auto sets the headers and uses a sprintf string to build the URL, injecting the baseurl + realm into the $pathString */ private function restApiRequest(string $pathString, array $payload, string $postRequestType = 'post'): Object { $token = $this->getAdminAccessToken(); $keycloakConfig = Configure::read('keycloak'); $http = new Client(); $url = sprintf( $pathString, $keycloakConfig['provider']['baseUrl'], $keycloakConfig['provider']['realm'] ); return $http->$postRequestType( $url, json_encode($payload), [ 'headers' => [ 'Content-Type' => 'application/json', 'Authorization' => 'Bearer ' . $token ] ] ); } public function enrollUser($data): bool { $roleConditions = [ 'id' => $data['role_id'] ]; if (!empty(Configure::read('keycloak.user_management.actions'))) { $roleConditions['name'] = Configure::read('keycloak.default_role_name'); } $user = [ 'username' => $data['username'], 'disabled' => false, 'individual' => $this->_table->Individuals->find()->where( [ 'id' => $data['individual_id'] ] )->first(), 'role' => $this->_table->Roles->find()->where($roleConditions)->first(), 'organisation' => $this->_table->Organisations->find()->where( [ 'id' => $data['organisation_id'] ] )->first() ]; $clientId = $this->getClientId(); $roles = $this->getAllRoles($clientId); $rolesParsed = []; foreach ($roles as $role) { $rolesParsed[$role['name']] = $role['id']; } if ($this->createUser($user, $clientId, $rolesParsed)) { $logChange = [ 'username' => $user['username'], 'individual_id' => $user['individual']['id'], 'role_id' => $user['role']['id'] ]; $this->_table->auditLogs()->insert([ 'request_action' => 'enrollUser', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Failed Keycloak enrollment for user {0}', $user['username']), 'changed' => $logChange ]); } else { $logChange = [ 'username' => $user['username'], 'individual_id' => $user['individual']['id'], 'role_id' => $user['role']['id'] ]; $this->_table->auditLogs()->insert([ 'request_action' => 'enrollUser', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Successful Keycloak enrollment for user {0}', $user['username']), 'changed' => $logChange ]); } return true; } private function getAdminAccessToken() { $keycloakConfig = Configure::read('keycloak'); $http = new Client(); $tokenUrl = sprintf( '%s/realms/%s/protocol/openid-connect/token', $keycloakConfig['provider']['baseUrl'], $keycloakConfig['provider']['realm'] ); $response = $http->post( $tokenUrl, sprintf( 'grant_type=client_credentials&client_id=%s&client_secret=%s', urlencode(Configure::read('keycloak.provider.applicationId')), urlencode(Configure::read('keycloak.provider.applicationSecret')) ), [ 'headers' => [ 'Content-Type' => 'application/x-www-form-urlencoded' ] ] ); $parsedResponse = json_decode($response->getStringBody(), true); return $parsedResponse['access_token']; } private function getClientId(): string { $response = $this->restApiRequest('%s/admin/realms/%s/clients?clientId=' . Configure::read('keycloak.provider.applicationId'), [], 'get'); $clientId = json_decode($response->getStringBody(), true); if (!empty($clientId[0]['id'])) { return $clientId[0]['id']; } else { throw new NotFoundException(__('Keycloak client ID not found or service account doesn\'t have the "view-clients" privilege.')); } } public function syncWithKeycloak(): array { $results = []; $data['Roles'] = $this->_table->Roles->find()->disableHydration()->toArray(); $data['Organisations'] = $this->_table->Organisations->find()->disableHydration()->toArray(); $data['Users'] = $this->_table->find()->contain(['Individuals', 'Organisations', 'Roles'])->select( [ 'id', 'uuid', 'username', 'disabled', 'Individuals.email', 'Individuals.first_name', 'Individuals.last_name', 'Individuals.uuid', 'Roles.name', 'Roles.uuid', 'Organisations.name', 'Organisations.uuid' ] )->disableHydration()->toArray(); $clientId = $this->getClientId(); $results = []; $results['roles'] = $this->syncRoles(Hash::extract($data['Roles'], '{n}.name'), $clientId, 'Role'); $results['organisations'] = $this->syncRoles(Hash::extract($data['Organisations'], '{n}.name'), $clientId, 'Organisation'); $results['users'] = $this->syncUsers($data['Users'], $clientId); return $results; } private function syncRoles(array $roles, string $clientId, string $scope = 'Role'): int { $keycloakRoles = $this->getAllRoles($clientId); $keycloakRolesParsed = Hash::extract($keycloakRoles, '{n}.name'); $rolesToAdd = []; $scopeString = $scope . ':'; $modified = 0; foreach ($roles as $role) { if (!in_array($scopeString . $role, $keycloakRolesParsed)) { $roleToPush = [ 'name' => $scopeString . $role, 'clientRole' => true ]; $url = '%s/admin/realms/%s/clients/' . $clientId . '/roles'; $response = $this->restApiRequest($url, $roleToPush, 'post'); if (!$response->isOk()) { $this->_table->auditLogs()->insert([ 'request_action' => 'keycloakCreateRole', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Failed to create role ({0}) in keycloak', $scopeString . $role), 'changed' => [ 'code' => $response->getStatusCode(), 'error_body' => $response->getStringBody() ] ]); } $modified += 1; } $keycloakRolesParsed = array_diff($keycloakRolesParsed, [$scopeString . $role]); } foreach ($keycloakRolesParsed as $roleToRemove) { if (substr($roleToRemove, 0, strlen($scopeString)) === $scopeString) { $url = '%s/admin/realms/%s/clients/' . $clientId . '/roles/' . $roleToRemove; $response = $this->restApiRequest($url, [], 'delete'); if (!$response->isOk()) { $this->_table->auditLogs()->insert([ 'request_action' => 'keycloakRemoveRole', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Failed to remove role ({0}) in keycloak', $roleToRemove), 'changed' => [ 'code' => $response->getStatusCode(), 'error_body' => $response->getStringBody() ] ]); } $modified += 1; } } return $modified; } private function getAllRoles(string $clientId): array { $response = $this->restApiRequest('%s/admin/realms/%s/clients/' . $clientId . '/roles', [], 'get'); return json_decode($response->getStringBody(), true); } private function syncUsers(array $users, $clientId, $roles = null): int { if ($roles === null) { $roles = $this->getAllRoles($clientId); } $rolesParsed = []; foreach ($roles as $role) { $rolesParsed[$role['name']] = $role['id']; } $response = $this->restApiRequest('%s/admin/realms/%s/users', [], 'get'); $keycloakUsers = json_decode($response->getStringBody(), true); $keycloakUsersParsed = []; foreach ($keycloakUsers as $u) { $response = $this->restApiRequest('%s/admin/realms/%s/users/' . $u['id'] . '/role-mappings/clients/' . $clientId, [], 'get'); $roleMappings = json_decode($response->getStringBody(), true); $keycloakUsersParsed[$u['username']] = [ 'id' => $u['id'], 'username' => $u['username'], 'enabled' => $u['enabled'], 'firstName' => $u['firstName'], 'lastName' => $u['lastName'], 'email' => $u['email'], 'roles' => $roleMappings ]; } $changes = 0; foreach ($users as &$user) { $changed = false; if (empty($keycloakUsersParsed[$user['username']])) { if ($this->createUser($user, $clientId, $rolesParsed)) { $changes = true; } } else { if ($this->checkAndUpdateUser($keycloakUsersParsed[$user['username']], $user)) { $changes = true; } if ($this->checkAndUpdateUserRoles($keycloakUsersParsed[$user['username']], $user, $clientId, $rolesParsed)) { $changes = true; } } if ($changed) { $changes += 1; } } return $changes; } private function checkAndUpdateUser(array $keycloakUser, array $user): bool { if ( $keycloakUser['enabled'] == $user['disabled'] || $keycloakUser['firstName'] !== $user['individual']['first_name'] || $keycloakUser['lastName'] !== $user['individual']['last_name'] || $keycloakUser['email'] !== $user['individual']['email'] ) { $change = [ 'enabled' => !$user['disabled'], 'firstName' => $user['individual']['first_name'], 'lastName' => $user['individual']['last_name'], 'email' => $user['individual']['email'], ]; $response = $this->restApiRequest('%s/admin/realms/%s/users/' . $keycloakUser['id'], $change, 'put'); if (!$response->isOk()) { $this->_table->auditLogs()->insert([ 'request_action' => 'keycloakUpdateUser', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Failed to update user ({0}) in keycloak', $user['username']), 'changed' => [ 'code' => $response->getStatusCode(), 'error_body' => $response->getStringBody() ] ]); } else { return true; } } return false; } private function createUser(array $user, string $clientId, array $rolesParsed): bool { $newUser = [ 'username' => $user['username'], 'enabled' => !$user['disabled'], 'firstName' => $user['individual']['first_name'], 'lastName' => $user['individual']['last_name'], 'email' => $user['individual']['email'] ]; $response = $this->restApiRequest('%s/admin/realms/%s/users', $newUser, 'post'); if (!$response->isOk()) { $this->_table->auditLogs()->insert([ 'request_action' => 'createUser', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Failed to create user ({0}) in keycloak {0}', $user['username']), 'changed' => [ 'code' => $response->getStatusCode(), 'error_body' => $response->getStringBody() ] ]); } $newUser = $this->restApiRequest( '%s/admin/realms/%s/users?username=' . $this->urlencodeEscapeForSprintf(urlencode($user['username'])), [], 'get' ); $users = json_decode($newUser->getStringBody(), true); if (empty($users[0]['id'])) { return false; } if (is_array($users[0]['id'])) { $users[0]['id'] = $users[0]['id'][0]; } $user['id'] = $users[0]['id']; $this->assignRolesToUser($user, $rolesParsed, $clientId); return true; } private function assignRolesToUser(array $user, array $rolesParsed, string $clientId): bool { $roles = [ [ 'id' => $rolesParsed['Role:' . $user['role']['name']], 'name' => 'Role:' . $user['role']['name'], 'clientRole' => true, 'containerId' => $clientId ], [ 'id' => $rolesParsed['Organisation:' . $user['organisation']['name']], 'name' => 'Organisation:' . $user['organisation']['name'], 'clientRole' => true, 'containerId' => $clientId ] ]; $response = $this->restApiRequest('%s/admin/realms/%s/users/' . $user['id'] . '/role-mappings/clients/' . $clientId, $roles, 'post'); if (!$response->isOk()) { $this->_table->auditLogs()->insert([ 'request_action' => 'keycloakAssignRoles', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Failed to create assign role ({0}) in keycloak to user {1}', $user['role']['name'], $user['username']), 'changed' => [ 'code' => $response->getStatusCode(), 'error_body' => $response->getStringBody() ] ]); } return true; } private function checkAndUpdateUserRoles(array $keycloakUser, array $user, string $clientId, array $rolesParsed): bool { $assignedRoles = $this->restApiRequest('%s/admin/realms/%s/users/' . $keycloakUser['id'] . '/role-mappings/clients/' . $clientId, [], 'get'); $assignedRoles = json_decode($assignedRoles->getStringBody(), true); $keycloakUserRoles = Hash::extract($assignedRoles, '{n}.name'); $assignedRolesParsed = []; foreach ($assignedRoles as $k => $v) { $assignedRolesParsed[$v['name']] = $v; } $userRoles = [ 'Organisation:' . $user['organisation']['name'] => [ 'id' => $rolesParsed['Organisation:' . $user['organisation']['name']], 'name' => 'Organisation:' . $user['organisation']['name'], 'clientRole' => true, 'containerId' => $clientId ], 'Role:' . $user['role']['name'] => [ 'id' => $rolesParsed['Role:' . $user['role']['name']], 'name' => 'Role:' . $user['role']['name'], 'clientRole' => true, 'containerId' => $clientId ] ]; $toAdd = array_diff(array_keys($userRoles), $keycloakUserRoles); $toRemove = array_diff($keycloakUserRoles, array_keys($userRoles)); $changed = false; foreach ($toRemove as $k => $role) { if (substr($role, 0, strlen('Organisation:')) !== 'Organisation:' && substr($role, 0, strlen('Role:') !== 'Role:')) { unset($toRemove[$k]); } else { $toRemove[$k] = $assignedRolesParsed[$role]; } } if (!empty($toRemove)) { $toRemove = array_values($toRemove); $response = $this->restApiRequest('%s/admin/realms/%s/users/' . $keycloakUser['id'] . '/role-mappings/clients/' . $clientId, $toRemove, 'delete'); if (!$response->isOk()) { $this->_table->auditLogs()->insert([ 'request_action' => 'keycloakDetachRole', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Failed to detach role ({0}) in keycloak from user {1}', $user['role']['name'], $user['username']), 'changed' => [ 'code' => $response->getStatusCode(), 'error_body' => $response->getStringBody() ] ]); } else { $changed = true; } } foreach ($toAdd as $k => $name) { $toAdd[$k] = $userRoles[$name]; } if (!empty($toAdd)) { $response = $this->restApiRequest('%s/admin/realms/%s/users/' . $keycloakUser['id'] . '/role-mappings/clients/' . $clientId, $toAdd, 'post'); if (!$response->isOk()) { $this->_table->auditLogs()->insert([ 'request_action' => 'keycloakAttachRoles', 'model' => 'User', 'model_id' => 0, 'model_title' => __('Failed to attach role ({0}) in keycloak to user {1}', $user['role']['name'], $user['username']), 'changed' => [ 'code' => $response->getStatusCode(), 'error_body' => $response->getStringBody() ] ]); } else { $changed = true; } } return $changed; } private function urlencodeEscapeForSprintf(string $input): string { return str_replace('%', '%%', $input); } }