keycloak.Role
Explore with Pulumi AI
# keycloak.Role
Allows for creating and managing roles within Keycloak.
Roles allow you define privileges within Keycloak and map them to users and groups.
Example Usage (Realm role)
import * as pulumi from "@pulumi/pulumi";
import * as keycloak from "@pulumi/keycloak";
const realm = new keycloak.Realm("realm", {
realm: "my-realm",
enabled: true,
});
const realmRole = new keycloak.Role("realm_role", {
realmId: realm.id,
name: "my-realm-role",
description: "My Realm Role",
});
import pulumi
import pulumi_keycloak as keycloak
realm = keycloak.Realm("realm",
realm="my-realm",
enabled=True)
realm_role = keycloak.Role("realm_role",
realm_id=realm.id,
name="my-realm-role",
description="My Realm Role")
package main
import (
"github.com/pulumi/pulumi-keycloak/sdk/v5/go/keycloak"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
realm, err := keycloak.NewRealm(ctx, "realm", &keycloak.RealmArgs{
Realm: pulumi.String("my-realm"),
Enabled: pulumi.Bool(true),
})
if err != nil {
return err
}
_, err = keycloak.NewRole(ctx, "realm_role", &keycloak.RoleArgs{
RealmId: realm.ID(),
Name: pulumi.String("my-realm-role"),
Description: pulumi.String("My Realm Role"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Keycloak = Pulumi.Keycloak;
return await Deployment.RunAsync(() =>
{
var realm = new Keycloak.Realm("realm", new()
{
RealmName = "my-realm",
Enabled = true,
});
var realmRole = new Keycloak.Role("realm_role", new()
{
RealmId = realm.Id,
Name = "my-realm-role",
Description = "My Realm Role",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.keycloak.Realm;
import com.pulumi.keycloak.RealmArgs;
import com.pulumi.keycloak.Role;
import com.pulumi.keycloak.RoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var realm = new Realm("realm", RealmArgs.builder()
.realm("my-realm")
.enabled(true)
.build());
var realmRole = new Role("realmRole", RoleArgs.builder()
.realmId(realm.id())
.name("my-realm-role")
.description("My Realm Role")
.build());
}
}
resources:
realm:
type: keycloak:Realm
properties:
realm: my-realm
enabled: true
realmRole:
type: keycloak:Role
name: realm_role
properties:
realmId: ${realm.id}
name: my-realm-role
description: My Realm Role
Example Usage (Client role)
import * as pulumi from "@pulumi/pulumi";
import * as keycloak from "@pulumi/keycloak";
const realm = new keycloak.Realm("realm", {
realm: "my-realm",
enabled: true,
});
const client = new keycloak.openid.Client("client", {
realmId: realm.id,
clientId: "client",
name: "client",
enabled: true,
accessType: "BEARER-ONLY",
});
const clientRole = new keycloak.Role("client_role", {
realmId: realm.id,
clientId: clientKeycloakClient.id,
name: "my-client-role",
description: "My Client Role",
});
import pulumi
import pulumi_keycloak as keycloak
realm = keycloak.Realm("realm",
realm="my-realm",
enabled=True)
client = keycloak.openid.Client("client",
realm_id=realm.id,
client_id="client",
name="client",
enabled=True,
access_type="BEARER-ONLY")
client_role = keycloak.Role("client_role",
realm_id=realm.id,
client_id=client_keycloak_client["id"],
name="my-client-role",
description="My Client Role")
package main
import (
"github.com/pulumi/pulumi-keycloak/sdk/v5/go/keycloak"
"github.com/pulumi/pulumi-keycloak/sdk/v5/go/keycloak/openid"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
realm, err := keycloak.NewRealm(ctx, "realm", &keycloak.RealmArgs{
Realm: pulumi.String("my-realm"),
Enabled: pulumi.Bool(true),
})
if err != nil {
return err
}
_, err = openid.NewClient(ctx, "client", &openid.ClientArgs{
RealmId: realm.ID(),
ClientId: pulumi.String("client"),
Name: pulumi.String("client"),
Enabled: pulumi.Bool(true),
AccessType: pulumi.String("BEARER-ONLY"),
})
if err != nil {
return err
}
_, err = keycloak.NewRole(ctx, "client_role", &keycloak.RoleArgs{
RealmId: realm.ID(),
ClientId: pulumi.Any(clientKeycloakClient.Id),
Name: pulumi.String("my-client-role"),
Description: pulumi.String("My Client Role"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Keycloak = Pulumi.Keycloak;
return await Deployment.RunAsync(() =>
{
var realm = new Keycloak.Realm("realm", new()
{
RealmName = "my-realm",
Enabled = true,
});
var client = new Keycloak.OpenId.Client("client", new()
{
RealmId = realm.Id,
ClientId = "client",
Name = "client",
Enabled = true,
AccessType = "BEARER-ONLY",
});
var clientRole = new Keycloak.Role("client_role", new()
{
RealmId = realm.Id,
ClientId = clientKeycloakClient.Id,
Name = "my-client-role",
Description = "My Client Role",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.keycloak.Realm;
import com.pulumi.keycloak.RealmArgs;
import com.pulumi.keycloak.openid.Client;
import com.pulumi.keycloak.openid.ClientArgs;
import com.pulumi.keycloak.Role;
import com.pulumi.keycloak.RoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var realm = new Realm("realm", RealmArgs.builder()
.realm("my-realm")
.enabled(true)
.build());
var client = new Client("client", ClientArgs.builder()
.realmId(realm.id())
.clientId("client")
.name("client")
.enabled(true)
.accessType("BEARER-ONLY")
.build());
var clientRole = new Role("clientRole", RoleArgs.builder()
.realmId(realm.id())
.clientId(clientKeycloakClient.id())
.name("my-client-role")
.description("My Client Role")
.build());
}
}
resources:
realm:
type: keycloak:Realm
properties:
realm: my-realm
enabled: true
client:
type: keycloak:openid:Client
properties:
realmId: ${realm.id}
clientId: client
name: client
enabled: true
accessType: BEARER-ONLY
clientRole:
type: keycloak:Role
name: client_role
properties:
realmId: ${realm.id}
clientId: ${clientKeycloakClient.id}
name: my-client-role
description: My Client Role
Example Usage (Composite role)
import * as pulumi from "@pulumi/pulumi";
import * as keycloak from "@pulumi/keycloak";
const realm = new keycloak.Realm("realm", {
realm: "my-realm",
enabled: true,
});
// realm roles
const createRole = new keycloak.Role("create_role", {
realmId: realm.id,
name: "create",
});
const readRole = new keycloak.Role("read_role", {
realmId: realm.id,
name: "read",
});
const updateRole = new keycloak.Role("update_role", {
realmId: realm.id,
name: "update",
});
const deleteRole = new keycloak.Role("delete_role", {
realmId: realm.id,
name: "delete",
});
// client role
const client = new keycloak.openid.Client("client", {
realmId: realm.id,
clientId: "client",
name: "client",
enabled: true,
accessType: "BEARER-ONLY",
});
const clientRole = new keycloak.Role("client_role", {
realmId: realm.id,
clientId: clientKeycloakClient.id,
name: "my-client-role",
description: "My Client Role",
});
const adminRole = new keycloak.Role("admin_role", {
realmId: realm.id,
name: "admin",
compositeRoles: [
"{keycloak_role.create_role.id}",
"{keycloak_role.read_role.id}",
"{keycloak_role.update_role.id}",
"{keycloak_role.delete_role.id}",
"{keycloak_role.client_role.id}",
],
});
import pulumi
import pulumi_keycloak as keycloak
realm = keycloak.Realm("realm",
realm="my-realm",
enabled=True)
# realm roles
create_role = keycloak.Role("create_role",
realm_id=realm.id,
name="create")
read_role = keycloak.Role("read_role",
realm_id=realm.id,
name="read")
update_role = keycloak.Role("update_role",
realm_id=realm.id,
name="update")
delete_role = keycloak.Role("delete_role",
realm_id=realm.id,
name="delete")
# client role
client = keycloak.openid.Client("client",
realm_id=realm.id,
client_id="client",
name="client",
enabled=True,
access_type="BEARER-ONLY")
client_role = keycloak.Role("client_role",
realm_id=realm.id,
client_id=client_keycloak_client["id"],
name="my-client-role",
description="My Client Role")
admin_role = keycloak.Role("admin_role",
realm_id=realm.id,
name="admin",
composite_roles=[
"{keycloak_role.create_role.id}",
"{keycloak_role.read_role.id}",
"{keycloak_role.update_role.id}",
"{keycloak_role.delete_role.id}",
"{keycloak_role.client_role.id}",
])
package main
import (
"github.com/pulumi/pulumi-keycloak/sdk/v5/go/keycloak"
"github.com/pulumi/pulumi-keycloak/sdk/v5/go/keycloak/openid"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
realm, err := keycloak.NewRealm(ctx, "realm", &keycloak.RealmArgs{
Realm: pulumi.String("my-realm"),
Enabled: pulumi.Bool(true),
})
if err != nil {
return err
}
// realm roles
_, err = keycloak.NewRole(ctx, "create_role", &keycloak.RoleArgs{
RealmId: realm.ID(),
Name: pulumi.String("create"),
})
if err != nil {
return err
}
_, err = keycloak.NewRole(ctx, "read_role", &keycloak.RoleArgs{
RealmId: realm.ID(),
Name: pulumi.String("read"),
})
if err != nil {
return err
}
_, err = keycloak.NewRole(ctx, "update_role", &keycloak.RoleArgs{
RealmId: realm.ID(),
Name: pulumi.String("update"),
})
if err != nil {
return err
}
_, err = keycloak.NewRole(ctx, "delete_role", &keycloak.RoleArgs{
RealmId: realm.ID(),
Name: pulumi.String("delete"),
})
if err != nil {
return err
}
// client role
_, err = openid.NewClient(ctx, "client", &openid.ClientArgs{
RealmId: realm.ID(),
ClientId: pulumi.String("client"),
Name: pulumi.String("client"),
Enabled: pulumi.Bool(true),
AccessType: pulumi.String("BEARER-ONLY"),
})
if err != nil {
return err
}
_, err = keycloak.NewRole(ctx, "client_role", &keycloak.RoleArgs{
RealmId: realm.ID(),
ClientId: pulumi.Any(clientKeycloakClient.Id),
Name: pulumi.String("my-client-role"),
Description: pulumi.String("My Client Role"),
})
if err != nil {
return err
}
_, err = keycloak.NewRole(ctx, "admin_role", &keycloak.RoleArgs{
RealmId: realm.ID(),
Name: pulumi.String("admin"),
CompositeRoles: pulumi.StringArray{
pulumi.String("{keycloak_role.create_role.id}"),
pulumi.String("{keycloak_role.read_role.id}"),
pulumi.String("{keycloak_role.update_role.id}"),
pulumi.String("{keycloak_role.delete_role.id}"),
pulumi.String("{keycloak_role.client_role.id}"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Keycloak = Pulumi.Keycloak;
return await Deployment.RunAsync(() =>
{
var realm = new Keycloak.Realm("realm", new()
{
RealmName = "my-realm",
Enabled = true,
});
// realm roles
var createRole = new Keycloak.Role("create_role", new()
{
RealmId = realm.Id,
Name = "create",
});
var readRole = new Keycloak.Role("read_role", new()
{
RealmId = realm.Id,
Name = "read",
});
var updateRole = new Keycloak.Role("update_role", new()
{
RealmId = realm.Id,
Name = "update",
});
var deleteRole = new Keycloak.Role("delete_role", new()
{
RealmId = realm.Id,
Name = "delete",
});
// client role
var client = new Keycloak.OpenId.Client("client", new()
{
RealmId = realm.Id,
ClientId = "client",
Name = "client",
Enabled = true,
AccessType = "BEARER-ONLY",
});
var clientRole = new Keycloak.Role("client_role", new()
{
RealmId = realm.Id,
ClientId = clientKeycloakClient.Id,
Name = "my-client-role",
Description = "My Client Role",
});
var adminRole = new Keycloak.Role("admin_role", new()
{
RealmId = realm.Id,
Name = "admin",
CompositeRoles = new[]
{
"{keycloak_role.create_role.id}",
"{keycloak_role.read_role.id}",
"{keycloak_role.update_role.id}",
"{keycloak_role.delete_role.id}",
"{keycloak_role.client_role.id}",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.keycloak.Realm;
import com.pulumi.keycloak.RealmArgs;
import com.pulumi.keycloak.Role;
import com.pulumi.keycloak.RoleArgs;
import com.pulumi.keycloak.openid.Client;
import com.pulumi.keycloak.openid.ClientArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var realm = new Realm("realm", RealmArgs.builder()
.realm("my-realm")
.enabled(true)
.build());
// realm roles
var createRole = new Role("createRole", RoleArgs.builder()
.realmId(realm.id())
.name("create")
.build());
var readRole = new Role("readRole", RoleArgs.builder()
.realmId(realm.id())
.name("read")
.build());
var updateRole = new Role("updateRole", RoleArgs.builder()
.realmId(realm.id())
.name("update")
.build());
var deleteRole = new Role("deleteRole", RoleArgs.builder()
.realmId(realm.id())
.name("delete")
.build());
// client role
var client = new Client("client", ClientArgs.builder()
.realmId(realm.id())
.clientId("client")
.name("client")
.enabled(true)
.accessType("BEARER-ONLY")
.build());
var clientRole = new Role("clientRole", RoleArgs.builder()
.realmId(realm.id())
.clientId(clientKeycloakClient.id())
.name("my-client-role")
.description("My Client Role")
.build());
var adminRole = new Role("adminRole", RoleArgs.builder()
.realmId(realm.id())
.name("admin")
.compositeRoles(
"{keycloak_role.create_role.id}",
"{keycloak_role.read_role.id}",
"{keycloak_role.update_role.id}",
"{keycloak_role.delete_role.id}",
"{keycloak_role.client_role.id}")
.build());
}
}
resources:
realm:
type: keycloak:Realm
properties:
realm: my-realm
enabled: true
# realm roles
createRole:
type: keycloak:Role
name: create_role
properties:
realmId: ${realm.id}
name: create
readRole:
type: keycloak:Role
name: read_role
properties:
realmId: ${realm.id}
name: read
updateRole:
type: keycloak:Role
name: update_role
properties:
realmId: ${realm.id}
name: update
deleteRole:
type: keycloak:Role
name: delete_role
properties:
realmId: ${realm.id}
name: delete
# client role
client:
type: keycloak:openid:Client
properties:
realmId: ${realm.id}
clientId: client
name: client
enabled: true
accessType: BEARER-ONLY
clientRole:
type: keycloak:Role
name: client_role
properties:
realmId: ${realm.id}
clientId: ${clientKeycloakClient.id}
name: my-client-role
description: My Client Role
adminRole:
type: keycloak:Role
name: admin_role
properties:
realmId: ${realm.id}
name: admin
compositeRoles:
- '{keycloak_role.create_role.id}'
- '{keycloak_role.read_role.id}'
- '{keycloak_role.update_role.id}'
- '{keycloak_role.delete_role.id}'
- '{keycloak_role.client_role.id}'
Argument Reference
The following arguments are supported:
realm_id
- (Required) The realm this role exists within.client_id
- (Optional) When specified, this role will be created as a client role attached to the client with the provided IDname
- (Required) The name of the roledescription
- (Optional) The description of the rolecomposite_roles
- (Optional) When specified, this role will be a composite role, composed of all roles that have an ID present within this list.
Import
Roles can be imported using the format {{realm_id}}/{{role_id}}
, where
role_id
is the unique ID that Keycloak assigns to the role. The ID is
not easy to find in the GUI, but it appears in the URL when editing the
role.
Example:
$ terraform import keycloak_role.role my-realm/7e8cf32a-8acb-4d34-89c4-04fb1d10ccad
Create Role Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Role(name: string, args: RoleArgs, opts?: CustomResourceOptions);
@overload
def Role(resource_name: str,
args: RoleArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Role(resource_name: str,
opts: Optional[ResourceOptions] = None,
realm_id: Optional[str] = None,
attributes: Optional[Mapping[str, str]] = None,
client_id: Optional[str] = None,
composite_roles: Optional[Sequence[str]] = None,
description: Optional[str] = None,
name: Optional[str] = None)
func NewRole(ctx *Context, name string, args RoleArgs, opts ...ResourceOption) (*Role, error)
public Role(string name, RoleArgs args, CustomResourceOptions? opts = null)
type: keycloak:Role
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args RoleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args RoleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args RoleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args RoleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args RoleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var roleResource = new Keycloak.Role("roleResource", new()
{
RealmId = "string",
Attributes =
{
{ "string", "string" },
},
ClientId = "string",
CompositeRoles = new[]
{
"string",
},
Description = "string",
Name = "string",
});
example, err := keycloak.NewRole(ctx, "roleResource", &keycloak.RoleArgs{
RealmId: pulumi.String("string"),
Attributes: pulumi.StringMap{
"string": pulumi.String("string"),
},
ClientId: pulumi.String("string"),
CompositeRoles: pulumi.StringArray{
pulumi.String("string"),
},
Description: pulumi.String("string"),
Name: pulumi.String("string"),
})
var roleResource = new Role("roleResource", RoleArgs.builder()
.realmId("string")
.attributes(Map.of("string", "string"))
.clientId("string")
.compositeRoles("string")
.description("string")
.name("string")
.build());
role_resource = keycloak.Role("roleResource",
realm_id="string",
attributes={
"string": "string",
},
client_id="string",
composite_roles=["string"],
description="string",
name="string")
const roleResource = new keycloak.Role("roleResource", {
realmId: "string",
attributes: {
string: "string",
},
clientId: "string",
compositeRoles: ["string"],
description: "string",
name: "string",
});
type: keycloak:Role
properties:
attributes:
string: string
clientId: string
compositeRoles:
- string
description: string
name: string
realmId: string
Role Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Role resource accepts the following input properties:
- Realm
Id string - Attributes Dictionary<string, string>
- Client
Id string - Composite
Roles List<string> - Description string
- Name string
- Realm
Id string - Attributes map[string]string
- Client
Id string - Composite
Roles []string - Description string
- Name string
- realm
Id String - attributes Map<String,String>
- client
Id String - composite
Roles List<String> - description String
- name String
- realm
Id string - attributes {[key: string]: string}
- client
Id string - composite
Roles string[] - description string
- name string
- realm_
id str - attributes Mapping[str, str]
- client_
id str - composite_
roles Sequence[str] - description str
- name str
- realm
Id String - attributes Map<String>
- client
Id String - composite
Roles List<String> - description String
- name String
Outputs
All input properties are implicitly available as output properties. Additionally, the Role resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Role Resource
Get an existing Role resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: RoleState, opts?: CustomResourceOptions): Role
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
attributes: Optional[Mapping[str, str]] = None,
client_id: Optional[str] = None,
composite_roles: Optional[Sequence[str]] = None,
description: Optional[str] = None,
name: Optional[str] = None,
realm_id: Optional[str] = None) -> Role
func GetRole(ctx *Context, name string, id IDInput, state *RoleState, opts ...ResourceOption) (*Role, error)
public static Role Get(string name, Input<string> id, RoleState? state, CustomResourceOptions? opts = null)
public static Role get(String name, Output<String> id, RoleState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Attributes Dictionary<string, string>
- Client
Id string - Composite
Roles List<string> - Description string
- Name string
- Realm
Id string
- Attributes map[string]string
- Client
Id string - Composite
Roles []string - Description string
- Name string
- Realm
Id string
- attributes Map<String,String>
- client
Id String - composite
Roles List<String> - description String
- name String
- realm
Id String
- attributes {[key: string]: string}
- client
Id string - composite
Roles string[] - description string
- name string
- realm
Id string
- attributes Mapping[str, str]
- client_
id str - composite_
roles Sequence[str] - description str
- name str
- realm_
id str
- attributes Map<String>
- client
Id String - composite
Roles List<String> - description String
- name String
- realm
Id String
Package Details
- Repository
- Keycloak pulumi/pulumi-keycloak
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
keycloak
Terraform Provider.