Authenticate Keycloak Single Sign-On (SSO) with WordPress OAuth
Overview
Set up Single Sign-On (SSO) on your WordPress website via Keycloak WordPress SSO with the WP OAuth & OpenID Connect Single Sign-On plugin. Implementing WordPress SSO using Keycloak allows users to log into your websites and applications with a single set of credentials using the Keycloak SSO OAuth provider. Keycloak, acts as the OAuth Provider, and WordPress act as the OAuth Client. WordPress Keycloak SSO provides smooth login between WordPress and Keycloak using login with Keycloak SSO with a single click. The WordPress SSO plugin also provides advanced Keycloak SSO features like user profile attribute mapping, role mapping, and providing site access based on organization email domains. You can also protect your complete WordPress site behind SSO. Keycloak WordPress OAuth SSO plugin secures the user’s login process and improves user authentication using Keycloak WordPress SSO. Follow the steps in the guide below to Setup Your WordPress SSO via installing this plugin.
Pre-requisites : Download And Installation
- Log into your WordPress instance as an admin.
- Go to the WordPress Dashboard -> Plugins and click on Add New.
- Search for a WordPress OAuth Single Sign-On (SSO) plugin and click on Install Now.
- Once installed click on Activate.
- First of all, Download Keycloak and install it.
- Start the keycloak server based on your keycloak version. (See table below)
For the Keycloak Version 16 and below |
Go to the Root Directory of keycloak bin standalone.sh |
For the Keycloak Version 17 and above |
Go to the Root Directory of keycloak bin kc.bat and run the below commands.
|
Configuration Steps
Step 1: Setup Keycloak as OAuth Provider
Follow the following steps to configure Keycloak as IdP to achieve WordPress Keycloak SSO
Select Keycloak version:
- Add Realm : Now login to keycloak administration console and navigate to your desired realm. You can add new realm by selecting Add Realm option.
- Create realm: Enter Realm Name and keep the realm name handy as it will required later to configure the Realm under the OAuth Client plugin. Click on CREATE to add realm.
- Create OpenID client: Click on the Clients and choose create to create a new client. Enter client id and select client protocol openeid-connect and select Save.
- Change Access type: After client is created change its access type to confidential.
- Enter Valid Redirect URIs: Copy callback URL from plugin and then click on
SAVE. Ex -- https://
/oauth/callback - Get Client Secret: Now we need to get client secret. So select Clients and select credentials and copy your secret from here.
- Plugin Configuration: Enter copied Client Secret under Client secret field in the OAuth Client plugin, and enter the Client Name under the Client ID field.
- Add User: We need to add users to realm who will be able to access the resources of realm. Click on the Users and choose to Add a new User.
- User Configuration: After user is created following action needs to be performed on it.
- Map User: We need to map user to a role. Click on Role Mappings and assign the user desired role from available roles and clicking on add selected.
- Create ROLE: The Role will be used by your applications to define which users will be authorized to access the application. Click on the Roles and choose Add Role.
- Create groups: Click on the Groups and choose New to create a new group.
- Assign user to group: Select the user whom you want to add in group. Choose Groups option from tab and then select the group-name and click on join.
- Keycloak Group Mapper: Now to get group details we need to perform its client mapping with group membership else group details will not be fetched. So in Client section, select your client and then click on mapper->create.
- Now, select mapper type as Group Membership and enter the name and token claim name i.e the attribute name corresponding to which groups will be fetched. Turn Off the full group path, Add to ID token and Add to access token options, and click on Save.
- Keycloak Role Mapper: Now to get role details we need to perform its client mapping with role membership else role details will not be fetched. So in Client section, select your client and then click on mapper->create.
- Now, select mapper type as user realm Role Membership and enter the name. and token claim name i.e the attribute name corresponding to which groups will be fetched. Add to ID token and Add to access token options, and click on Save.
- Add Realm : Now login to keycloak administration console and navigate to your desired realm. You can add new realm by selecting Create Realm option.
- Create realm: Enter Realm Name and keep the realm name handy as it will required later to configure the Realm under the OAuth Client plugin. Click on CREATE to add realm.
- Create OpenID client: Click on the Clients and choose Create Client to create a new client. Enter Client id and select client protocol openeid-connect and Click Next.
- Enable the Client Authentication and Authorization toggle.
- Scroll down to the Access settings and enter your Callback/Redirect URL which you will get from your miniOrange plugin present on your Client side under the CallBack URLs text-field.
- Go to the Credentials tab, copy the Client Secret and keep it handy as we will require it later while configuring WordPress OAuth Single Sign-On plugin.
- Plugin Configuration: Enter copied Client Secret under Client secret field in the OAuth Client plugin, and enter the Client ID under the Client ID field.
- Add User: We need to add users to realm who will be able to access the resources of realm. Click on the Users and Click on Create new user to Add a new User.
- User Configuration: After user is created following action needs to be performed on it.
- Map User: We need to map user to a role. Click on Role Mappings and assign the user desired role from available roles.
- Create ROLE: The Role will be used by your applications to define which users will be authorized to access the application. Click on the Roles and choose Create Role.
- Add Realm : Now login to keycloak administration console and navigate to your desired realm. You can add new realm by selecting Create Realm option.
- Create realm: Enter Realm Name and keep the realm name handy as it will required later to configure the Realm under the OAuth Client plugin. Click on CREATE to add realm.
- Create OpenID client: Click on the Clients and choose Create Client to create a new client. Enter Client id and select client protocol openeid-connect and Click Next.
- Enable the Client Authentication and Authorization toggle.
- Scroll down to the Access settings and enter your Callback/Redirect URL which you will get from your miniOrange plugin present on your Client side under the CallBack URLs text-field.
- Go to the Credentials tab, copy the Client Secret and keep it handy as we will require it later while configuring WordPress OAuth Single Sign-On plugin.
- Plugin Configuration: Enter copied Client Secret under Client secret field in the OAuth Client plugin, and enter the Client ID under the Client ID field.
- Add User: We need to add users to realm who will be able to access the resources of realm. Click on the Users and Click on Create new user to Add a new User.
- User Configuration: After user is created following action needs to be performed on it.
- Map User: We need to map user to a role. Click on Role Mappings and assign the user desired role from available roles.
- 1) Setting a password for it so click on Credentials and set a new Password
for the user.
NOTE : Disabling Temporary will make user password permanent.
Step 1.1: Steps to fetch Keycloak Groups [Premium]
Note: -- If full path is on group path will be fetched else group name will be fetched.
Step 1.2: Steps to fetch Keycloak Roles [Premium]
- 1) Setting a password for it so click on Credentials and set a new Password
for the user.
NOTE : Disabling Temporary will make user password permanent.
- 1) Setting a password for it so click on Credentials and set a new Password
for the user.
NOTE : Disabling Temporary will make user password permanent.
In conclusion, by successfully configuring Keycloak as OAuth Provider, you have enabled WordPress Keycloak SSO Login and authorization for your end users into WordPress.
Step 2: Setup WordPress as OAuth Client
- Free
- Premium
Step 3: User Attribute Mapping
- User Attribute Mapping is mandatory for enabling users to successfully login into WordPress. We will be setting up user profile attributes for WordPress using below settings.
- Go to Configure OAuth tab. Scroll down and click on Test Configuration.
- You will see all the values returned by your OAuth Provider to WordPress in a table. If you don't see value for First Name, Last Name, Email or Username, make the required settings in your OAuth Provider to return this information.
- Once you see all the values in Test Configuration, go to Attribute / Role Mapping tab, you will get the list of attributes in a Username dropdown.
Finding user attributes:
Step 4: Role Mapping[Premium]
- Click on “Test Configuration” and you will get the list of Attribute Names and Attribute Values that are sent by your OAuth provider.
- From the Test Configuration window, map the Attribute Names in the Attribute Mapping section of the plugin. Refer to the screenshot for more details.
- Enable Role Mapping: To enable Role Mapping, you need to map Group Name Attribute. Select the
attribute name from the list of attributes which returns the roles from your provider application.
Eg: Role - Assign WordPress role to the Provider role: Based on your provider application, you can allocate the
WordPress role to your provider roles. It can be a student, teacher, administrator or any other depending on
your application. Add the provider
roles under Group Attribute Value and assign the required WordPress role in front of it under WordPress
Role.
For example, in the below image. Teacher has been assigned the role of Administrator & Student is assigned the role of Subscriber. - Once you save the mapping, the provider role will be assigned the WordPress administrator role after
SSO.
Example: As per the given example, Users with role ‘teacher’ will be added as Administrator in WordPress and ‘student’ will be added as Subscriber.
Step 5: Steps to fetch Keycloak Groups
Create Groups in Keycloak:
Note: If you already have the groups created and assigned to the customers then you can skip the steps to create a group.
- Under your realm go to the Groups tab and click on the Create Group button.
- Enter a group name and click on the Create button.
- Now go to the group you created and click on the Members tab. Click on the Add member button to add the members.
- Add the members you want to the group and click on the Add button.
- Now go to the Client scopes tab and select Profile scope.
- Go to the Mappers tab and click on Add mapper button.
- Select By configuration option.
- Select the Group Membership mapping from the table.
- Add the Name and Token Claim Name for your mapper. Click on the Save button.
- Now go to the OAuth Single Sign-On plugin and click on the Test Configuration button. You should see the groups assigned to the user.
Step 6: Sign In Settings
- WordPress 5.7 and below
- WordPress 5.8
- WordPress 5.9 and above
Step 7: Scope & Endpoints
Scope: | email profile openid |
Authorize Endpoint: | <keycloak domain>/realms/{realm-name}/protocol/openid-connect/auth |
Access Token Endpoint: | <keycloak domain>/realms/{realm-name}/protocol/openid-connect/token |
Get User Info Endpoint: | <keycloak domain>/realms/{realm-name}/protocol/openid-connect/userinfo |
Custom redirect URL after logout:[optional] | https://{keycloak domain}/realms/{realm-name}/protocol/openid-connect/logout?post_logout_redirect_uri={RedirectUri}&id_token_hint=##id_token## |
Scope: | email profile openid |
Authorize Endpoint: | <keycloak domain>/auth/realms/{realm-name}/protocol/openid-connect/auth |
Access Token Endpoint: | <keycloak domain>/auth/realms/{realm-name}/protocol/openid-connect/token |
Get User Info Endpoint: | <keycloak domain>/auth/realms/{realm-name}/protocol/openid-connect/userinfo |
Custom redirect URL after logout:[optional] | <keycloak domain>/auth/realms/{realm-name}/protocol/openid-connect/logout?redirect_uri=RedirectUri |
You have successfully enabled WordPress SSO Login with the WordPress OAuth & OpenID Connect Single Sign-On (SSO) plugin by configuring Keycloak as IdP (OAuth Provider) and WordPress as an OAuth client. Keycloak OAuth Authorization means you can quickly roll out secure access to your WordPress(WP) site, allowing users to safely authenticate using Keycloak SSO login credentials.
Frequently Asked Questions(FAQs)
I cannot find Domain and Realm in Keycloak admin interface.
Login to the Keycloak administration console. Go to the Realm settings -> general section, and you will get the Realm name. Read more