Application which shows how to integrate with the Nuts node to administer identities.
Example running the application, connecting to a Nuts node running on http://nutsnode:8081:
$ docker run -p 1305:1305 -e NUTS_NODE_ADDRESS=http://nutsnode:8081 nutsfoundation/nuts-admin:latestWhen running in Docker without a config file mounted at /app/config.yaml it will use the default configuration.
The application can be configured through /app/config.yaml or environment variables.
It supports the following configuration options:
portorPORT: overrides the default HTTP port (1305) the application listens on.node.addressorNUTS_NODE_ADDRESS: points to the internal API of the Nuts node, e.g.http://nutsnode:8081.
The following properties configure OIDC user authorization in Nuts admin:
oidc.enabledorNUTS_OIDC_ENABLED: set totrueto enable OIDC user authentication.oidc.metadataorNUTS_OIDC_METADATA: points to the OIDC metadata endpoint, e.g.https://auth.example.com/.well-known/openid-configuration.oidc.client.idorNUTS_OIDC_CLIENT_ID: the client ID to use for OIDC authentication.oidc.client.secretorNUTS_OIDC_CLIENT_SECRET: the client secret to use for OIDC authentication.oidc.scopeorNUTS_OIDC_SCOPE: the scope(s) to use for OIDC authentication, defaults toopenid,profile, andemail.
The following properties should be used if API authentication is enabled on the Nuts node:
node.auth.keyfileorNUTS_NODE_AUTH_KEYFILE: points to a PEM encoded private key file. The corresponding public key should be configured on the Nuts node in SSH authorized keys format.node.auth.userorNUTS_NODE_AUTH_USER: must match the user in the SSH authorized keys file.node.auth.audienceorNUTS_NODE_AUTH_AUDIENCE: must match the configured audience.
This application does support OIDC user authentication. This has only been tested with Azure Entra ID, but it should work with any OIDC provider.
However, if OIDC user authentication is not enabled, make sure to restrict access in any other case than local development. The application proxies REST API calls to the configured Nuts node, so leaving it unsecured will allow anyone to access the proxied Nuts node REST APIs.
You can have users logged in with their Azure Entra ID account. Nuts Admin will authenticate to Azure Entra ID using client_id and client_secret.
The configuration (as environment variables) could look as below.
It assumes Nuts Admin runs on https://example.com/admin/. Make sure to fill in the correct tenantId and client_id and client_secret.
NUTS_URL=https://example.com/admin/
NUTS_OIDC_ENABLED=true
NUTS_OIDC_METADATA=https://login.microsoftonline.com/<tenantId>/v2.0/.well-known/openid-configuration
NUTS_OIDC_CLIENT_ID=<client_id>
NUTS_OIDC_CLIENT_SECRET=<client_secret>Typically, you create an enterprise application in Azure Entra ID and configure the redirect URI to https://example.com/admin/auth/openid-connect/callback (given the example base URL).
Then, you make sure the users or groups that you want to give access are assigned to the enterprise application.
To let Nuts Admin access Azure Entra ID, you can register a user-assigned managed identity in Azure and generate the client_id and client_secret.
For more information regarding OIDC on Azure, see https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc.
During front-end development, you probably want to use the real filesystem and webpack in watch mode:
make devYou can access the website at http://localhost:1305/ by default
The API and domain types are generated from the api/api.yaml.
make gen-apiFrontend framework is vue.js 3.x
Icons are from https://heroicons.com
CSS framework is https://tailwindcss.com