Keycloak SAML SSO into TYPO3 (Single Sign-On) | TYPO3 Keycloak SSO | Login using Keycloak

Keycloak SAML SSO into TYPO3 (Single Sign-On) | TYPO3 Keycloak SSO | Login using Keycloak


Keycloak SAML Single Sign-On (SSO) login for TYPO3 can be achieved by using our Typo3 SAML SP Single Sign-On (SSO) extension. Typo3 will be configurd as a SAML 2.0 compliant Service Provider as a result of our SSO solution, which will build trust between the Typo3 site and Keycloak SAML in order to securely authenticate and login users to the Typo3 site. Our Typo3 Single Sign-On (SSO) solution helps to secure Typo3 sites behind the SSO login so that users are authenticated using their Keycloak login credentials. Seamless support for advanced SSO features like Attribute / Custom Mapping, Role Mapping etc.

Here we will go through a guide to configure SAML Single Sign-On SSO login between Typo3 site and Keycloak SAML by considering Keycloak SAML as IdP (Identity Provider) and Typo3 as SP (Service Provider). Our Typo3 SAML extension SSO provides Unlimited user authentications from Keycloak SAML. To know more about other features we provide in you Typo3 SAML Single Sign-On (SSO) extension, you can click here.

Pre-requisites : Download And Installation

  • Log into your Typo3 instance as an admin.
  • Navigate to Extensions tab from left pane.
  • Select Get Extension from the dropdown and search for miniOrange SAML and install the extension.
  • Now select Installed Extensions from the dropdown menu and search for SAML and activate the extension.

Steps to configure Keycloak SAML SAML Single Sign-On (SSO) Login into Typo3

1. Setup Keycloak SAML as IdP (Identity Provider)

Follow the steps below to configure Keycloak SAML as IdP for Typo3

miniorange img Configure Keycloak SAML as IdP
  • Select the realm you want to use in the Keycloak Admin console.
  • To create a new client/application, go to the left menu and select Clients, then Create.
  • Creating an APP - Keycloak SAML Single Sign-On(SSO) for Typo3
  • From the "Service Provider Metadata" Tab, select SP-EntityID / Issuer as the Client ID and SAML as the Client Protocol.
  • Typo3 Keycloak SAML Single Sign-On(SSO) Add Client
  • Now click on Save.
  • Configure Keycloak by providing the required details:
  • Client ID The SP-EntityID / Issuer from Service Provider Metadata
    NameProvide a name for this client (Eg. Joomla)
    Description (optional)Provide a description
    EnabledON
    Consent RequiredOFF
    Client ProtocolSAML
    Include AuthnStatementNO
    Sign DocumentsNO
    Optimize Redirect signing key lookupOFF
    Sign AssertionsNO
    Signature AlgorithmRSA_SHA256
    Encrypt AssertionOFF
    Client Signature RequiredOFF
    Client Signature RequiredEXCLUSIVE
    Force Name ID FormatNO
    Name ID FormatEmail
    Root URLLeave empty or Base URL of Service Provider
    Valid Redirect URIsThe ACS (Assertion Consumer Service) URL from Service Provider Metadata
    Keycloak SAML Single Sign-On(SSO) for Typo3 Keycloak Typo3 SSO Login Keycloak Typo3 SSO Login Settings
  • Under Fine Grain SAML Endpoint Configuration, Enter the following details:
  • Assertion Consumer Service POST Binding URL The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab
    Logout Service Redirect Binding URL (Optional) The Single Logout URL from the plugin's Service Provider Metadata tab
    Keycloak SAML Single Sign-On(SSO) for Typo3 - Keycloak Typo3 SSO Login
  • Click on Save.

miniorange img  Add Mappers

  • Go to the Mappers tab and press the Add Builtin button.
  • Keycloak Login - Mappers Tab Keycloak Typo3 SSO Login
  • Enable the checkboxes of X500 givenName, X500 surname and X500 email attributes.
  • SAML Keycloak Login Add built-in protocol mapper Keycloak SAML Single Sign-On(SSO) for Typo3
  • Click on Add Selected button. You will see the mappings that are added below.
  • Keycloak SSO Add Selected Keycloak SAML Single Sign-On(SSO) for Typo3

miniorange img Download setup file

  • Navigate to Realm Settings, click on SAML 2.0 Identity Provider Metadata mentioned as Endpoints in the General Tab.
  • JBoss Keycloak SSO Keycloak SAML Single Sign-On(SSO)
  • Note the URL and keep it handy. That will provide you with the Endpoints required to configure the plugin.
  • You have successfully configured Keycloak as SAML IdP ( Identity Provider) for achieving Keycloak login / Keycloak SSO / Keycloak Single Sign-On (SSO), ensuring secure Login into Typo3 Site.

2. Configure Typo3 as SP (Service Provider)

  • In Typo3 SSO extension, go to the SP settings tab and enter Fesaml Plugin Page URL, Response Page URL, ACS URL, Entity ID and all other required details.
  • Typo3 SAML SSO Single Sign-On(SSO) SP settings
  • Now, go to the IdP settings tab of the extension. There are two ways to configure the Typo3 SSO extension.
  • A. By uploading IDP metadata:

  • Enter the Identity Provider Name
  • Click on Upload IDP metadata button.
  • You can either upload a metadata file and click on Upload button or use a metadata URL to fetch the metadata.
  • Typo3 SAML Single Sign-On(SSO) upload metadata

    B. Manual Configuration:

  • Copy SAML Entity ID, SAML Single-Sign-On Endpoint URL and x.509 certificate from Federation Metadata document and paste it in IdP Entity ID or Issuer, Single Sign-on Service URL, x.509 Certificate fields respectively in the extension.
  • IdP Entity ID or Issuer SAML Entity ID obtained from the IdP
    Single Sign-On Service URL SAML Single-Sign-On Endpoint URL obtained from the IdP
    X.509 Certificate x.509 Certificate obtained from the IdP
  • Click on Save button to save all your settings.
  • Typo3 SAML SSO Single Sign-On(SSO) Login in Typo3 Save IdP settings
  • To check if your Typo3 as SP is configured correctly, click the Test Configuration button.
  • Test configuration for typo3 saml SSO extension

3: Attribute / Custom Mapping (Optional). *This is Premium feature.

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Typo3 user attributes like firstname, lastname and so on.
  • While auto registering the users in your Typo3 site these attributes will automatically get mapped to your Typo3 user details.
  • Only NameID can be mapped to Typo3 Email and Username characteristics with the free extension. Multiple user attributes from the IdP, on the other hand, can be mapped to Typo3 attributes in the premium version of the extension. You can map custom attributes that you've added to your IdP in addition to the default attributes.
  • When a user performs SSO, the NameID value sent by the IdP will get mapped to the email and the username of the Typo3 user.
  • Login in typo3 attribute mapping typo3 SAML SSO
  • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

4: Group Mapping (Optional). *This is Premium feature.

  • You can specify a default Group in the free extension that will be allocated to all non-admin users when they conduct SSO.
  • Go to Group mapping tab and navigate to Group Mapping section.
  • Select the Default Group and click on the Save button.
  • Typo3 SAML SSO Single Sign-On(SSO) Login in Typo3 - Group mapping

In this Guide, you have successfully configured Keycloak SAML SAML Single Sign-On (Keycloak SAML SSO Login) choosing Keycloak SAML as IdP and Typo3 as SP using Typo3 SAML Single Sign-On (SSO) extension .This solution ensures that you are ready to roll out secure access to your Typo3 site using Keycloak SAML login credentials within minutes.

Additional Resources


If you are looking for anything which you cannot find, please drop us an email on info@xecurify.com

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com