julabo / keycloak_roles_yourls
Restrict Keycloak Admin Access
Installs: 7
Dependents: 0
Suggesters: 0
Security: 0
Stars: 0
Watchers: 0
Forks: 0
Open Issues: 0
Type:yourls-plugin
pkg:composer/julabo/keycloak_roles_yourls
Requires
- php: >=7.4.0
- julabo/keycloak_yourls: ^1.0
This package is auto-updated.
Last update: 2025-12-11 12:58:13 UTC
README
A YOURLS plugin that restricts administrative access based on Keycloak roles. Only users with the "User" role in Keycloak are allowed to access the YOURLS admin interface. Only users with the "Admin" role in Keycloak are allowed to manage plugins in the YOURLS admin interface.
Features
- Role-based Access Control:
- Restricts YOURLS admin interface to users with the Keycloak "User" role
- Restricts plugin management to users with the Keycloak "Admin" role
- JWT Token Validation: Decodes and validates Keycloak ID tokens from user sessions
- Admin Menu Control: Dynamically removes plugin menu items for unauthorized users
- Debug Support: Comprehensive debugging output when YOURLS debug mode is enabled
- Session Integration: Works seamlessly with existing OIDC/Keycloak authentication
Requirements
- YOURLS URL shortener
- Keycloak server with OIDC authentication configured
- PHP 7.4.0 or higher
- The Keycloak Plugin installed and configured
- Active PHP session with Keycloak ID tokens
Installation
-
Download or clone this repository to your YOURLS plugins directory:
cd /path/to/yourls/user/plugins/ git clone https://github.com/julabo/keycloak_roles_yourls.git -
Activate the plugin through the YOURLS admin interface or by adding it to your configuration.
Configuration
The plugin uses the following constants that can be customized:
OIDC_ADMIN_ROLE: The Keycloak role required for admin access (default: "Admin")OIDC_USER_ROLE: The Keycloak role required for user access (default: "User")
To change the required role, modify this constants in your config.php:
define('OIDC_ADMIN_ROLE', 'YourCustomAdminRole'); define('OIDC_USER_ROLE', 'YourCustomUserRole');
How It Works
- Token Validation: The plugin checks for the presence of
oidc_id_tokenin the user's session - JWT Decoding: Decodes the JWT payload to extract user roles
- Role Verification: Checks if the user has the required role in
resource_access.yourls.roles - Access Control: Blocks access to
plugins.phpand removes plugin menu items for unauthorized users
Debugging
Enable YOURLS debug mode to see detailed token and role information:
php define('YOURLS_DEBUG', true);
This will display:
- Current script being accessed
- Decoded ID token payload
- User roles from Keycloak
- Access control decisions
Security Features
- 403 Forbidden Response: Unauthorized access attempts return proper HTTP status codes
- Menu Item Removal: Plugin management links are hidden from unauthorized users
- Session-based Validation: Relies on server-side session data, not client-side tokens
Keycloak Configuration
Ensure your Keycloak client is configured to:
- Include the "yourls" resource in the access token
- Assign appropriate roles to users under the "yourls" client scope
- Configure OIDC authentication for your YOURLS instance
Error Handling
The plugin gracefully handles:
- Missing or invalid JWT tokens
- Malformed token payloads
- Missing role information
- Session initialization issues
License
This project is licensed under the MIT License - see the LICENSE file for full license text.
Support
For issues, feature requests, or contributions, please visit the GitHub repository.