Setup Guide for Keycloak App

Step 1: Setup Keycloak as OAuth Provider

  • Create openid client : Click on the Clients and choose create to create a new client. Enter client id and select client protocol openid-connect and select Save.
  • OAuth/OpenID/OIDC Single Sign On (SSO) using Keycloak Identity Provider, Setup Client App
  • Change Access type: After client is created change its access type to confidential.
  • OAuth/OpenID/OIDC Single Sign On (SSO) using Keycloak Identity Provider, Change Access type
  • Enter Valid Redirect URIs :
    • Copy callback URL from plugin and insert here. Ex https://<domain-name>/oauth/callback
    • Click on SAVE.
    • OAuth/OpenID/OIDC Single Sign On (SSO) using Keycloak Identity Provider, Redirect URIs
  • Keycloak Group Mapper: Now to get group details we need to perform its client mapping with group membership else group details will not be fetched. So in client select Mappers and then click on create. Select mapper type Group Membership and enter name and token claim-name i.e the attribute name corresponding which groups will be fetched. Turn Off full group path else group mapping will fail. Click on save.
  • OAuth/OpenID/OIDC Single Sign On (SSO) using Keycloak Identity Provider, Group Mapper
  • Realm name: You need a realm name when you set up Keycloak as an OAuth provider, kindly copy it. For example in this case it is Master
  • OAuth/OpenID/OIDC Single Sign On (SSO) using Keycloak Identity Provider, Realm name
  • Get Client Secret: To get Client Secret Navigate to Clients, select Client Id and navigate to the Credentials tab.
  • OAuth/OpenID/OIDC Single Sign On (SSO)using Keycloak Identity Provider, Client App Credentials