Guide for Drupal Single Sign On (SSO) using JBoss Keycloak as Identity Provider (IdP)

Jboss keycloak Single Sign On (SSO) For Drupal miniOrange provides a ready to use solution for Drupal. This solution ensures that you are ready to roll out secure access to your Drupal site using Jboss Keycloak within minutes.

Step 1: Configuring Jboss keycloak as Identity Provider (IdP)

  • In your Keycloak admin console, select the realm that you want to use.
  • Drupal Jboss Keycloak add relem
  • Click on the Clients from the left navigation bar.
  • Click on create button at the top right corner and enter the following values to create a new client/application.
    Client ID SP-EntityID/Issuer from Service Provider Metadata
    Client protocol SAML
    Client SAML Endpoint (optional) The ACS (Assertion Consumer Service) URL from Service Provider Metadata
  • Drupal Jboss Keycloak new client application Drupal Jboss Keycloak new client/application
  • Click on Save.
  • Configure the following:
    Client ID The SP-EntityID / Issuer from Service Provider Metadata
    NameProvide a name for this client (Eg. Drupal)
    Description (optional)Provide a description
    Consent RequiredOFF
    Client ProtocolSAML
    Include AuthnStatementNO
    Sign DocumentsNO
    Optimize Redirect signing key lookupOFF
    Sign AssertionsNO
    Signature AlgorithmRSA_SHA256
    Encrypt AssertionOFF
    Client Signature RequiredOFF
    Client Signature RequiredEXCLUSIVE
    Force Name ID FormatNO
    Name ID FormatEmail
    Root URLLeave empty or Base URL of Service Provider
    Valid Redirect URIsThe ACS (Assertion Consumer Service) URL from Service Provider Metadata
  • Under Fine Grain SAML Endpoint Configuration, configure the following:
    Assertion Consumer Service POST Binding URLThe ACS (Assertion Consumer Service) URL from Service Provider Metadata
    Logout Service Redirect Binding URLThe Single Logout URL from Service Provider Metadata
  • Click on Save.

Drupal Jboss Keycloak Saml Endpoint Add Mappers

  • Add the following attributes in the Mappers tab.
  • Click on Add Built-in and add the following option.
  • Drupal Jboss Keycloak Mappers tab

miniorange  Add User

  • Click on the Users from the left nav bar.
  • Add a new user/view all users.
  • Drupal Jboss Keycloak user tab
  • Enter the username, valid email address and check on User Enabled.
  • Drupal Jboss Keycloak User Enabled
  • Click on Save.

Step 2: Configuring Drupal as Service Provider(SP)

  • Click on the Realm Settings from the left nav bar and open SAML 2.0 Identity Provider Metadata.
  • Jboss keycloak Realm Setting


  • Go to, https://<YOUR_DOMAIN>/auth/realms/{YOUR_REALM}/protocol/saml/descriptor.These will open an XML in the browser.
  •  Drupal Jboss keycloak XML browser
  • In miniOrange’s Drupal SAML SP plugin, go to Service Provider Setup Tab. Enter the following values:
  • Identity Provider Name Provide an Identity Provider name (For Example: Keycloak).
    IdP Entity ID or IssuerSearch for the entityID from IDP Metadata.Enter the Value in the Entity ID textbox.
    SAML Login URLSearch for SingleSignOnService Binding ”urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect” from IDP Metadata.Enter the location value in the SAML Login URL textbox.
    SAML Logout URL (Optional)Search for SingleLogoutService Binding”urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect” from IDP Metadata.Enter the location value in the SAML Login URL textbox.
    X.509 Certificate (Optional)Search for the X.509 Certificate from IDP Metadata.Enter the tag value in Certificate textbox.
    Enable login with SAMLChecked
    Signed SSO and SLO RequestsUnchecked
    Jboss keycloak Certificate
  • Click on Save Configuration.
  • Test the configuration after successful saving.
  • Jboss keycloak Site login url

Free Trial

If you don't find what you are looking for, please contact us at or call us at +1 978 658 9387.