Skip to main content

Security Settings

Security settings manage authentication integration, certificate management, and session policies for the SecureLink platform.

Keycloak Integration

SecureLink uses Keycloak as its identity provider for all user authentication. The platform does not store or manage passwords directly — all credential management is handled by Keycloak.

Connection Settings

SettingDescription
Realm URLFull URL to the Keycloak realm (e.g., https://keycloak.securelink.example.com/realms/securelink)
Client IDThe OAuth2 client ID registered in Keycloak for this orchestrator
Client SecretThe client secret for server-side token validation
JWKS EndpointThe JSON Web Key Set endpoint used to verify token signatures (typically {realm_url}/protocol/openid-connect/certs)

SecureLink uses a Token Exchange pattern:

  1. Users authenticate with Keycloak and receive a Keycloak JWT
  2. The JWT is exchanged via the /auth/exchange endpoint for a VSN+ session token
  3. The session token contains full authorization context (user type, tenant ID, roles, permissions)
  4. All subsequent API requests use the VSN+ session token
info

SecureLink uses Keycloak for all authentication. Password policies — including minimum length, complexity requirements, and account lockout — are configured in Keycloak, not in SecureLink.

TLS Certificates

Manage the TLS certificates used for secure communication across the platform:

CertificatePurpose
API TLSHTTPS certificate for the API server
MQTT TLSCertificate for encrypted MQTT communication between edges and the broker
Edge CommunicationCertificates used during edge bootstrap and ongoing configuration sync

Certificates can be uploaded, renewed, or regenerated from this page. The system tracks certificate expiry dates and can be configured to send warnings before expiration (see Alert Configuration).

Session Timeout

Configure how long VSN+ session tokens remain valid before requiring re-authentication.

  • Default: 24 hours
  • Minimum: 1 hour
  • Maximum: 72 hours

When a session token expires, the user is redirected to the Keycloak login page to re-authenticate.

Password Policy

All password policies are managed through Keycloak. To configure password requirements:

  1. Log in to the Keycloak admin console
  2. Navigate to the appropriate realm
  3. Go to Authentication > Policies > Password Policy
  4. Configure the desired rules (minimum length, special characters, password history, etc.)

Changes to password policy in Keycloak take effect immediately for all new password operations.