I know that Keycloak, if configured to, will allow HTTP traffic (instead of HTTPS) from
private address ranges. Is there a way to add to that list?
Use case: My K8s cluster uses 100.64.0.0/10 for containers and for short while I would
like to allow HTTP from that range too.
Longer term, I am going to implement TLS but that isn't quite at the top of the
roadmap yet.
Best regards,
Graham Burgess
RΛZΞR|stormmore
Sr. DevOps Engineer (USA)
Email: graham.burgess(a)razer.com
DID: (415) 374 0639
[
http://assets.razerzone.com/email/email-sig.jpg]
Razer.com<https://www.razer.com/> | Razer Game
Store<https://gamestore.razer.com/> | Razer
Insider<https://insider.razer.com/> | Razer
zVault<https://zvault.razer.com/>
[
https://upload.wikimedia.org/wikipedia/commons/thumb/c/c2/F_icon.svg/200p...
[Twitter_Social_Icon_Rounded_Square_Color] <
https://twitter.com/Razer>
[glyph-logo_May2016] <
https://www.instagram.com/razer/>
[youtube_social_squircle_red] <
https://www.youtube.com/Razer?sub_confirmation=1>
Razer Inc. (San Francisco)
201 3rd Street, Suite 900
San Francisco CA 94103, USA
Tel: +1 (415) 266 5300
Razer Inc. Stock Code: 1337.HK
IMPORTANT NOTICE: This e-mail may be confidential, legally privileged or otherwise
protected from disclosure. If you are not an intended recipient, do not copy, distribute
or use its contents. Do inform the sender that you have received the message in error and
delete it from your system. E-mails are not secure and may suffer errors, computer
viruses, delay, interception and amendment. Razer accepts neither risk nor liability for
any damage or loss caused by this e-mail. To the extent permitted by applicable law, Razer
reserves the right to retain, monitor and intercept e-mails to and from its systems.