AW Users
Add Adventure Works users ..
Add AW Users
In this hands-on workshop, you'll learn how to create test users in Keycloak to validate your identity federation and community setup between Keycloak and PDC. We'll walk through adding Adventure Works employees across different organizational roles, setting up their credentials, and preparing them for group membership assignment that demonstrates the complete WHO + WHAT identity governance pipeline.
By the end of this workshop, you will be able to:
Create enterprise users in Keycloak with proper organizational context
Configure user credentials and authentication settings for testing scenarios
Understand the difference between test user creation and production directory synchronization
Prepare users for group membership assignment and role inheritance testing
Establish realistic test scenarios that mirror production organizational structures
Validate identity federation workflows with representative user personas
Create the foundation for testing data governance access controls

Log into Keycloak:
Username: admin
Password: admin
Ensure you select the Pentaho Data Catalog Realm.
Select: Users > Add User

Enter the following details to add AW users:
Datasource Administrator
hugo.
hugo.reilly
Hugo
Reilly
ON

Complete the next steps - Credentials & Groups - to complete User profile:
Credentials
Credentials serve as the primary mechanism for verifying user identity. Keycloak supports various credential types (passwords, OTP tokens, certificates, WebAuthn) that ensure only authorized users can access protected resources.
Select: Credentials tab.
Set password Welcome123!

Ensure Temporary is Off.

Save.

Test that you can log into Data Catalog.


Groups & Inheritance
in Keycloak, group membership is not automatically inherited upward through the group hierarchy. If you add a user to the deepest child group, they will only be a direct member of that specific group.
However, the user will inherit all the roles and attributes that are assigned to the parent groups in the hierarchy. So while they won't show up as explicit members of the main group and first child group, they will effectively have all the permissions and attributes from those parent groups.
Group Membership:
User is only a direct member of the deepest child group
User does not appear in the member lists of parent groups
Role/Attribute Inheritance:
User inherits all roles assigned to the deepest child group
User also inherits all roles assigned to the parent child group
User also inherits all roles assigned to the main group
Just select the child group
sarah.johnson
Sales_Division
Sales_Analysts
michael.chen
HR_Division
HR_Specialists
elena.rodriguez
Data_Governance
Data_Stewards
david.park
Data_Governance
Compliance_Officers
james.lock
IT_Operations
System_Administors
Select: Groups tab.

Click: Join Group

Click: Join

Repeat for the other Users - see table above.
Last updated
Was this helpful?
