Search Results :
×Configure secured WordPress Keycloak Single Sign On (SSO) login using our WordPress(WP) SAML Single Sign-On(SSO) plugin. The WP SAML SSO plugin leverages the SAML 2.0 protocol to allow users to use their Keycloak credentials for a seamless WordPress Keycloak Login via SSO. Facilitating WordPress Keycloak SSO enables users to authenticate against their Keycloak credentials and securely access your WordPress site.
This step-by-step setup guide will help you configure Keycloak as Identity Provider (IDP) and WordPress as Service Provider (SP) to achieve WordPress Keycloak SSO. You can visit our WordPress SSO plugin to know more about the other features we provide.
Follow the following steps to configure Keycloak as IdP to achieve WordPress Keycloak SSO
Client ID | The SP-EntityID / Issuer from the plugin's Service Provider Metadata tab |
Name | Provide a name for this client |
Description | Provide a description |
Client Signature Required | OFF |
Force POST Binding | OFF |
Force Name ID Format | OFF |
Name ID Format | |
Root URL | Leave empty or Provide Base URL from Service Provider Metadata tab |
Valid Redirect URIs | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Assertion Consumer Service POST Binding URL | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Logout Service Redirect Binding URL (Optional) | The Single Logout URL from the plugin's Service Provider Metadata tab |
Client ID | The SP-EntityID / Issuer from the plugin's Service Provider Metadata tab |
Name | Provide a name for this client |
Description | Provide a description |
Client Signature Required | OFF |
Force POST Binding | OFF |
Force Name ID Format | OFF |
Name ID Format | |
Root URL | Leave empty or Provide Base URL from Service Provider Metadata tab |
Valid Redirect URIs | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Assertion Consumer Service POST Binding URL | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Logout Service Redirect Binding URL (Optional) | The Single Logout URL from the plugin's Service Provider Metadata tab |
Root URL | Leave empty or provide Base URL from Service Provider Metadata tab |
Valid Redirect URIs | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Force POST Binding | OFF |
Force Name ID Format | OFF |
Name ID Format |
Assertion Consumer Service POST Binding URL | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Logout Service Redirect Binding URL (Optional) | The Single Logout URL from the plugin's Service Provider Metadata tab |
Add Mappers
Download setup file
You have successfully configured Keycloak as SAML IdP ( Identity Provider) for achieving WordPress Kecloak SSO, ensuring secure Login into WordPress (WP) Site.
You have successfully configured Keycloak as SAML IdP ( Identity Provider) for achieving Keycloak login / Keycloak SSO / Keycloak Single Sign-On (SSO), ensuring secure Login into WordPress (WP) Site.
You have successfully configured Keycloak as SAML IdP ( Identity Provider) for achieving Keycloak login / Keycloak SSO / Keycloak Single Sign-On (SSO), ensuring secure Login into WordPress (WP) Site.
Note: If you intend to set up Attribute Mapping, Role Mapping, and other configurations on the Identity Provider's end, you can find detailed instructions in the provided setup guide, which is linked here.
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
NOTE: If you click on Test Configuration button in Service Provider Setup tab and authenticate with your IDP, you can see a list of attributes sent by the IDP in the Attribute/Role mapping tab. This information can be used to provide the above mapping.
In the standard plugin, you can choose a default role which will be assigned to all the non-admin users when they perform SSO.
In the Standard plugin you can enable SP-initiated SSO using the following options.
NOTE: Please enable the Backdoor login and note down the backdoor URL. This will allow you to access the WordPress login page in case you get locked out of the IDP.
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
This feature allows you to assign and manage roles of the users when they perform SSO. Along with the default WordPress roles, this is compatible with any custom roles as well.
In the Premium plugin you can enable SP-initiated SSO using the following options.
NOTE: Please enable the Backdoor login and note down the backdoor URL. This will allow you to access the WordPress login page in case you get locked out of the IDP login.
You have successfully configured WordPress (WP) as SAML SP for achieving WordPress Keycloak Single Sign On.
In this Guide, you have successfully configured Keycloak Single Sign-On (Keycloak WordPress SSO / WordPress Keycloak Login), choosing Keycloak as IdP and WordPress as SP. WordPress SAML Single Sign-On – SSO plugin solution ensures that you are ready to roll out secure access/login into WordPress (WP) site using Keycloak login credentials.
Allows syncing user's creation, updation and deletion from your IDP to WordPress site
Know more →Restricts WordPress pages and posts based on User Roles and User's Login Status
Know more →Maps SSO users to LearnDash groups as per the group attributes sent by your IDP
Know more →If you are looking for anything which you cannot find, please drop us an email on samlsupport@xecurify.com
Get prompt support from our technical experts, accessible around the clock for direct assistance
Easily set up the plugin with access to our detailed knowledge base, comprehensive guides & instructional videos.
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com
This privacy statement applies to miniorange websites describing how we handle the personal information. When you visit any website, it may store or retrieve the information on your browser, mostly in the form of the cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not directly identify you, but it can give you a more personalized web experience. Click on the category headings to check how we handle the cookies. For the privacy statement of our solutions you can refer to the privacy policy.
Necessary cookies help make a website fully usable by enabling the basic functions like site navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any personal identifiable information. However, some parts of the website will not work properly without the cookies.
These cookies only collect aggregated information about the traffic of the website including - visitors, sources, page clicks and views, etc. This allows us to know more about our most and least popular pages along with users' interaction on the actionable elements and hence letting us improve the performance of our website as well as our services.