Skip to content

IAM - Overview

IAM (Identity and Access Management) provides core functionality for managing users, roles, groups, permissions, service2service authentication, authorization and the gateway. It is based on open source components (Keycloak and Kong). Some facade components exist for legacy reasons.

Login and Logout

User can login to IEM using the launchpad url. The User can enter his username or email and password and click Login.

The user can logout by clicking on the logout button in the OS-bar.

User Info

The logged in user's details can be obtained by clicking on the user info icon on the OS-bar.

Account Management

The user can update his account details by clicking on the the user icon on the OS-bar and selecting Account Management.

IEM Users

Upon successful deployment of the IEM, two users are automatically created: the System Admin and the IEM Admin. These users are initially set with default values for their username and email, but users have the option to configure these values during the installation process. You can find more information on this topic in the Quickstart Onboarding using Templates section.

System Admin

The System Admin user is responsible for managing the customer realm. This user is created with the default username customer_admin and an automatically generated password. In addition to having administrative rights in the IEM, this user also has the ability to manage Keycloak settings within the customer realm.

IEM Admin

The IEM Admin user is the intended user for the IEM. By default, this user is created with the username iem_user and an automatically generated password. This user is enabled for the IEM and holds the administrator role for the Industrial Edge Management App. While this user is enabled by default, it can be disabled during the installation process by setting the flag --set central-auth.keycloak.initialUser.enabled=false. More detailed instructions on configuring users and passwords during installation can be found in the Configure Users and Passwords for the First Installation section.

Keycloak

Keycloak is the underlying open source software of the Industrial Edge Identity and Access Management. The following pages describe the use of Keycloak in Industrial Edge Management.

Name HTML Link
Official Keycloak documentation v 26.2
REST API documentation v 26.2.4
CLI tool documentation v 26.2.4
Downloadable Keycloak archive v 26.2.4

Keycloak Sidebar Overview

If the user is logged in as customer_admin, he will be able to access customer realm admin console by clicking on Identity and Access Management icon on launchpad. The user will see various options to manage clients, realm roles, users, groups, sessions, events etc. The user can also configure authentication and identity providers or change realm settings here.

Realm

Users, credentials, roles, and groups within the IEM are managed by realms. A realm is responsible for managing the authentication and authorization of users. Each user is assigned to a specific realm, which they can log into. Different realms can coexist simultaneously and are isolated from each other. Each realm can only manage and authenticate users within its own control. However, it's worth mentioning that the IEM does not support additional realms and is specifically configured to work with the Customer realm.

When the IEM is deployed, a default realm called the Customer realm is automatically created.

NOTICE

Do not change anything that is automatically created in the Customer realm. Otherwise, the IEM may not work properly.

NOTICE

The following Keycloak features do not work with the IAM:

  • Remember me
  • Impersonation
  • Representation of Admin events

User federation

The user federation feature facilitates the integration of external user databases such as LDAP or Active Directory. The IEM application needs to import users into the Keycloak database to maintain a stable user ID for its operations.