Configuring the Management Interface

Learn how to configure Keycloak's management interface for endpoints like metrics and health checks.

The management interface allows accessing management endpoints via a different HTTP server than the primary one. It provides the possibility to hide endpoints like /metrics or /health from the outside world and, therefore, hardens the security. The most significant advantage might be seen in Kubernetes environments as the specific management port might not be exposed.

Management interface configuration

The management interface is turned on by default, so management endpoints such as /metrics, and /health are exposed on the default management port 9000. In order to change the port for the management interface, you can use the Keycloak option http-management-port.

The management interface provides a set of options and is fully configurable. If these options for the management HTTP server are not explicitly set, their values are automatically inherited from the default HTTP server.

You can change the relative path of the management interface, as the prefix path for the management endpoints can be different. You can achieve it via the Keycloak option http-management-relative-path.

For instance, if you set the CLI option --http-management-relative-path=/management, the metrics, and health endpoints will be accessed on the /management/metrics and /management/health paths.

If you do not explicitly set the value for it, the value from the http-relative-path property is used. For instance, if you set the CLI option --http-relative-path=/auth, these endpoints are accessible on the /auth/metrics and /auth/health paths.

TLS support

When the TLS is set for the default Keycloak server, the management interface will be accessible through HTTPS as well. The management interface can run only either on HTTP or HTTPS, not both as for the main server.

Specific Keycloak management interface options with the prefix https-management-* were provided for setting different TLS parameters for the management HTTP server. Their function is similar to their counterparts for the main HTTP server, for details see Configuring TLS. When these options are not explicitly set, the TLS parameters are inherited from the default HTTP server.

Disable Management interface

The management interface is automatically turned off when nothing is exposed on it. Currently, only health checks and metrics are exposed on the management interface regardless. If you want to disable exposing them on the management interface, set the Keycloak property legacy-observability-interface to true.

Exposing health and metrics endpoints on the default server is not recommended for security reasons, and you should always use the management interface. Beware, the legacy-observability-interface option is deprecated and will be removed in future releases. It only allows you to give more time for the migration.

Relevant options

Value

http-management-port

Port of the management interface.

CLI: --http-management-port
Env: KC_HTTP_MANAGEMENT_PORT

Available only when Management interface is enabled

9000 (default)

http-management-relative-path

Set the path relative to / for serving resources from management interface.

The path must start with a /. If not given, the value is inherited from HTTP options.

CLI: --http-management-relative-path
Env: KC_HTTP_MANAGEMENT_RELATIVE_PATH

Available only when Management interface is enabled

/ (default)

https-management-certificate-file

The file path to a server certificate or certificate chain in PEM format for the management server.

If not given, the value is inherited from HTTP options.

CLI: --https-management-certificate-file
Env: KC_HTTPS_MANAGEMENT_CERTIFICATE_FILE

Available only when Management interface is enabled

https-management-certificate-key-file

The file path to a private key in PEM format for the management server.

If not given, the value is inherited from HTTP options.

CLI: --https-management-certificate-key-file
Env: KC_HTTPS_MANAGEMENT_CERTIFICATE_KEY_FILE

Available only when Management interface is enabled

https-management-client-auth

Configures the management interface to require/request client authentication.

If not given, the value is inherited from HTTP options.

CLI: --https-management-client-auth
Env: KC_HTTPS_MANAGEMENT_CLIENT_AUTH

Available only when Management interface is enabled

none (default), request, required

https-management-key-store-file

The key store which holds the certificate information instead of specifying separate files for the management server.

If not given, the value is inherited from HTTP options.

CLI: --https-management-key-store-file
Env: KC_HTTPS_MANAGEMENT_KEY_STORE_FILE

Available only when Management interface is enabled

https-management-key-store-password

The password of the key store file for the management server.

If not given, the value is inherited from HTTP options.

CLI: --https-management-key-store-password
Env: KC_HTTPS_MANAGEMENT_KEY_STORE_PASSWORD

Available only when Management interface is enabled

password (default)

legacy-observability-interface

If metrics/health endpoints should be exposed on the main HTTP server (not recommended).

If set to true, the management interface is disabled.

CLI: --legacy-observability-interface
Env: KC_LEGACY_OBSERVABILITY_INTERFACE

DEPRECATED.

true, false (default)

On this page