Search Results :
×Keycloak Single Sign-On (SSO) for WordPress uses OAuth Authorization flow to provide users secure access to WordPress site. With our WordPress OAuth Single Sign-On (SSO) plugin, Keycloak acts as the OpenID Connect and OAuth provider, ensuring secure login for WordPress websites.
The integration of WordPress with Keycloak simplifies and secures the login process using Keycloak OAuth. This solution allows employees to access their WordPress sites with a single click using their Keycloak credentials, completely removing the need to store, remember, and reset multiple passwords.
In addition to offering Keycloak SSO functionality, the plugin extends its support to various IDPs, including Azure AD, Office 365, and specialized providers, offering robust Single Sign-On (SSO) capabilities like multi-tenant login, role mapping, and user profile attribute mapping. For further insights into the array of features we offer within the WP OAuth & OpenID Connect Client plugin, kindly refer here. You can follow the below steps to setup Keycloak Single Sign-On (SSO) with WordPress
In addition to offering Keycloak SSO functionality, the plugin extends its support to various IDPs, including Azure AD, Office 365, and specialized providers, offering robust SSO capabilities like multi-tenant login, role mapping, and user profile attribute mapping. For further insights into the array of features we offer within the WP OAuth & OpenID Connect Client plugin, kindly refer here. You can follow the below steps to setup Keycloak Single Sign-On (SSO) with WordPress.
For the Keycloak Version 16 and below |
Go to the Root Directory of keycloak bin standalone.sh |
For the Keycloak Version 17 and above |
Go to the Root Directory of keycloak bin kc.bat and run the below commands.
|
NOTE : Disabling Temporary will make user password permanent.
Step 1.1: Steps to fetch Keycloak Groups [Premium]
Note: -- If full path is on group path will be fetched else group name will be fetched.
Step 1.2: Steps to fetch Keycloak Roles [Premium]
NOTE : Disabling Temporary will make user password permanent.
Step 1.1: Steps to fetch Keycloak Groups [Premium]
In conclusion , You have successfully configured Keycloak as OAuth Provider, for achieving Keycloak Single Sign-On (SSO) with WordPress for user authentication.
Note: -- The domain name would be the domain of the machine where your keycloak is running followed by the port number, for e.g if your keycloak is running on localhost then the domain would be http://localhost:8080.
In conclusion , You have successfully configured WordPress as OAuth Client, for achieving Keycloak Single Sign-On (SSO) with WordPress for user authentication.
Note: -- The domain name would be the domain of the machine where your keycloak is running followed by the port number, for e.g if your keycloak is running on localhost then the domain would be http://localhost:8080.
In conclusion , You have successfully configured WordPress as OAuth Client, for achieving Keycloak Single Sign-On (SSO) with WordPress for user authentication.
Sign in settings for WordPress 5.7 and before
Sign in settings for WordPress 5.8
Sign in settings for WordPress 5.9
Please refer the below table for configuring the scope & endpoints for Keycloak Version 18 and above in the plugin.
Scope: | email profile openid |
Authorize Endpoint: | <keycloak domain>/realms/{realm-name}/protocol/openid-connect/auth |
Access Token Endpoint: | <keycloak domain>/realms/{realm-name}/protocol/openid-connect/token |
Get User Info Endpoint: | <keycloak domain>/realms/{realm-name}/protocol/openid-connect/userinfo | Custom redirect URL after logout: [optional] | https://{keycloak domain}/realms/{realm-name}/protocol/openid-connect/logout?post_logout_redirect_uri={encodedRedirectUri}&id_token_hint=##id_token## |
Please refer the below table for configuring the scope & endpoints for Keycloak Version 17 and below in the plugin.
Scope: | email profile openid |
Authorize Endpoint: | <keycloak domain>/auth/realms/{realm-name}/protocol/openid-connect/auth |
Access Token Endpoint: | <keycloak domain>/auth/realms/{realm-name}/protocol/openid-connect/token |
Get User Info Endpoint: | <keycloak domain>/auth/realms/{realm-name}/protocol/openid-connect/userinfo | Custom redirect URL after logout: [optional] | <keycloak domain>/auth/realms/{realm-name}/protocol/openid-connect/logout?redirect_uri=encodedRedirectUri |
In conclusion, after successfully configuring Keycloak as an OAuth Provider and WordPress as an OAuth Client, you've achieved a smooth and secure authentication process for your users. Through Keycloak Single Sign-On (SSO), you can ensure a robust user experience within the WordPress environment. This allows users the ease of accessing multiple applications with a single set of login credentials. Through the integration of Keycloak OAuth as the primary authentication solution, users can securely log into their WordPress accounts with their existing Keycloak credentials.
Login to the Keycloak administration console. Go to the Realm settings -> general section, and you will get the Realm name. Need more assistance with Keycloak SSO?Read more
Experiencing challenges with Keycloak SSO? Mail us on oauthsupport@xecurify.com for quick guidance(via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com
This privacy statement applies to miniorange websites describing how we handle the personal information. When you visit any website, it may store or retrieve the information on your browser, mostly in the form of the cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not directly identify you, but it can give you a more personalized web experience. Click on the category headings to check how we handle the cookies. For the privacy statement of our solutions you can refer to the privacy policy.
Necessary cookies help make a website fully usable by enabling the basic functions like site navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any personal identifiable information. However, some parts of the website will not work properly without the cookies.
These cookies only collect aggregated information about the traffic of the website including - visitors, sources, page clicks and views, etc. This allows us to know more about our most and least popular pages along with users' interaction on the actionable elements and hence letting us improve the performance of our website as well as our services.