@@ -148,28 +148,29 @@ The following table lists the configurable parameters of the Keycloak chart and
148148
149149### TLS Configuration
150150
151- | Parameter | Description | Default |
152- | --------------------------------- | ----------------------------------------------------------------------------------------------- | ------------------------------------------- |
153- | ` tls.enabled ` | Enable TLS/HTTPS support using custom certificates | ` false ` |
154- | ` tls.existingSecret ` | Name of existing secret containing TLS certificate and key (PEM format, keys: tls.crt, tls.key) | ` "" ` |
155- | ` tls.certificateFile ` | Path where the TLS certificate file will be mounted (internal) | ` "/opt/keycloak/certs/tls.crt" ` |
156- | ` tls.certificateKeyFile ` | Path where the TLS certificate key file will be mounted (internal) | ` "/opt/keycloak/certs/tls.key" ` |
157- | ` tls.certManager.enabled ` | Enable cert-manager integration for automatic certificate provisioning | ` false ` |
158- | ` tls.certManager.issuerRef.name ` | Name of the cert-manager Issuer or ClusterIssuer | ` "" ` |
159- | ` tls.certManager.issuerRef.kind ` | Kind of the cert-manager issuer (Issuer or ClusterIssuer) | ` ClusterIssuer ` |
160- | ` tls.certManager.issuerRef.group ` | Group of the cert-manager issuer | ` cert-manager.io ` |
161- | ` tls.certManager.duration ` | Certificate duration (e.g., 2160h for 90 days) | ` "" ` |
162- | ` tls.certManager.renewBefore ` | Time before expiry to renew certificate (e.g., 360h for 15 days) | ` "" ` |
163- | ` tls.certManager.commonName ` | Certificate common name (defaults to first dnsName if not specified) | ` "" ` |
164- | ` tls.certManager.dnsNames ` | List of DNS names for the certificate (uses ingress.hosts if not specified) | ` [] ` |
165- | ` tls.certManager.ipAddresses ` | List of IP addresses for the certificate | ` [] ` |
166- | ` tls.certManager.secretName ` | Name for the generated secret (defaults to ` <fullname>-tls ` ) | ` "" ` |
167- | ` tls.certManager.usages ` | Certificate key usages | ` ["digital signature", "key encipherment"] ` |
168- | ` tls.certManager.annotations ` | Additional annotations for the Certificate resource | ` {} ` |
169- | ` tls.truststoreEnabled ` | Enable truststore for client certificate validation or outgoing HTTPS requests | ` false ` |
170- | ` tls.truststoreExistingSecret ` | Name of existing secret containing truststore file (Java Keystore format, key: truststore.jks) | ` "" ` |
171- | ` tls.truststorePassword ` | Password for the truststore (use with caution - consider using existing secret) | ` "" ` |
172- | ` tls.truststoreFile ` | Path where the truststore file will be mounted (internal) | ` "/opt/keycloak/truststore/truststore.jks" ` |
151+ | Parameter | Description | Default |
152+ | --------------------------------- | ------------------------------------------------------------------------------------------------------ | ------------------------------------------- |
153+ | ` tls.enabled ` | Enable TLS/HTTPS support using custom certificates | ` false ` |
154+ | ` tls.existingSecret ` | Name of existing secret containing TLS certificate and key (PEM format, keys: tls.crt, tls.key) | ` "" ` |
155+ | ` tls.certificateFile ` | Path where the TLS certificate file will be mounted (internal) | ` "/opt/keycloak/certs/tls.crt" ` |
156+ | ` tls.certificateKeyFile ` | Path where the TLS certificate key file will be mounted (internal) | ` "/opt/keycloak/certs/tls.key" ` |
157+ | ` tls.certManager.enabled ` | Enable cert-manager integration for automatic certificate provisioning | ` false ` |
158+ | ` tls.certManager.issuerRef.name ` | Name of the cert-manager Issuer or ClusterIssuer | ` "" ` |
159+ | ` tls.certManager.issuerRef.kind ` | Kind of the cert-manager issuer (Issuer or ClusterIssuer) | ` ClusterIssuer ` |
160+ | ` tls.certManager.issuerRef.group ` | Group of the cert-manager issuer | ` cert-manager.io ` |
161+ | ` tls.certManager.duration ` | Certificate duration (e.g., 2160h for 90 days) | ` "" ` |
162+ | ` tls.certManager.renewBefore ` | Time before expiry to renew certificate (e.g., 360h for 15 days) | ` "" ` |
163+ | ` tls.certManager.commonName ` | Certificate common name (defaults to first dnsName if not specified) | ` "" ` |
164+ | ` tls.certManager.dnsNames ` | List of DNS names for the certificate (uses ingress.hosts if not specified) | ` [] ` |
165+ | ` tls.certManager.ipAddresses ` | List of IP addresses for the certificate | ` [] ` |
166+ | ` tls.certManager.secretName ` | Name for the generated secret (defaults to ` <fullname>-tls ` ) | ` "" ` |
167+ | ` tls.certManager.usages ` | Certificate key usages | ` ["digital signature", "key encipherment"] ` |
168+ | ` tls.certManager.annotations ` | Additional annotations for the Certificate resource | ` {} ` |
169+ | ` tls.truststoreEnabled ` | Enable truststore for client certificate validation or outgoing HTTPS requests | ` false ` |
170+ | ` tls.truststoreExistingSecret ` | Name of existing secret containing truststore file (Java Keystore format, default-key: truststore.jks) | ` "" ` |
171+ | ` tls.truststoreExistingSecretKey ` | Key of the secret to get the trustStorePassword from | ` "truststore.jks" ` |
172+ | ` tls.truststorePassword ` | Password for the truststore (use with caution - consider using existing secret) | ` "" ` |
173+ | ` tls.truststoreFile ` | Path where the truststore file will be mounted (internal) | ` "/opt/keycloak/truststore/truststore.jks" ` |
173174
174175### Database Configuration
175176
0 commit comments