julabo/keycloak_roles_yourls
最新稳定版本:1.1.1
Composer 安装命令:
composer require julabo/keycloak_roles_yourls
包简介
Restrict Keycloak Admin Access
README 文档
README
A YOURLS plugin that restricts administrative access based on Keycloak roles. Only users with the "User" role in Keycloak are allowed to access the YOURLS admin interface. Only users with the "Admin" role in Keycloak are allowed to manage plugins in the YOURLS admin interface.
Features
- Role-based Access Control:
- Restricts YOURLS admin interface to users with the Keycloak "User" role
- Restricts plugin management to users with the Keycloak "Admin" role
- JWT Token Validation: Decodes and validates Keycloak ID tokens from user sessions
- Admin Menu Control: Dynamically removes plugin menu items for unauthorized users
- Debug Support: Comprehensive debugging output when YOURLS debug mode is enabled
- Session Integration: Works seamlessly with existing OIDC/Keycloak authentication
Requirements
- YOURLS URL shortener
- Keycloak server with OIDC authentication configured
- PHP 7.4.0 or higher
- The Keycloak Plugin installed and configured
- Active PHP session with Keycloak ID tokens
Installation
-
Download or clone this repository to your YOURLS plugins directory:
cd /path/to/yourls/user/plugins/ git clone https://github.com/julabo/keycloak_roles_yourls.git -
Activate the plugin through the YOURLS admin interface or by adding it to your configuration.
Configuration
The plugin uses the following constants that can be customized:
OIDC_ADMIN_ROLE: The Keycloak role required for admin access (default: "Admin")OIDC_USER_ROLE: The Keycloak role required for user access (default: "User")
To change the required role, modify this constants in your config.php:
define('OIDC_ADMIN_ROLE', 'YourCustomAdminRole'); define('OIDC_USER_ROLE', 'YourCustomUserRole');
How It Works
- Token Validation: The plugin checks for the presence of
oidc_id_tokenin the user's session - JWT Decoding: Decodes the JWT payload to extract user roles
- Role Verification: Checks if the user has the required role in
resource_access.yourls.roles - Access Control: Blocks access to
plugins.phpand removes plugin menu items for unauthorized users
Debugging
Enable YOURLS debug mode to see detailed token and role information:
php define('YOURLS_DEBUG', true);
This will display:
- Current script being accessed
- Decoded ID token payload
- User roles from Keycloak
- Access control decisions
Security Features
- 403 Forbidden Response: Unauthorized access attempts return proper HTTP status codes
- Menu Item Removal: Plugin management links are hidden from unauthorized users
- Session-based Validation: Relies on server-side session data, not client-side tokens
Keycloak Configuration
Ensure your Keycloak client is configured to:
- Include the "yourls" resource in the access token
- Assign appropriate roles to users under the "yourls" client scope
- Configure OIDC authentication for your YOURLS instance
Error Handling
The plugin gracefully handles:
- Missing or invalid JWT tokens
- Malformed token payloads
- Missing role information
- Session initialization issues
License
This project is licensed under the MIT License - see the LICENSE file for full license text.
Support
For issues, feature requests, or contributions, please visit the GitHub repository.
统计信息
- 总下载量: 7
- 月度下载量: 0
- 日度下载量: 0
- 收藏数: 0
- 点击次数: 0
- 依赖项目数: 0
- 推荐数: 0
其他信息
- 授权协议: MIT
- 更新时间: 2025-12-09