Top.Mail.Ru
Configuring Authentication Using OpenID Connect and Keycloak
CTRL+K

Configuring Authentication Using OpenID Connect and Keycloak

In this article
  • Configuring Authentication Using OpenID Connect and Keycloak
  • Configuring the Client in Keycloak
  • Adding Authentication in Operavix

Configuring authentication using Client ID and Client Secret via OpenID Connect (OIDC) enhances authorization security and enables centralized management of user access to the Operavix system through Keycloak. This method is especially useful when authenticating a large number of users.

To configure authentication via OIDC and Keycloak using the Client ID and Client Secret mechanism, follow the steps below.

Configuring the Client in Keycloak

  1. In the settings tab of the new client, select the client type OpenID Connect and specify a Client ID to identify the client in Keycloak. New client configuration
  2. In the Credentials tab, in the Client Authenticator field, select the authentication type Client ID and Secret. This parameter defines how the Operavix client authenticates with Keycloak. Credentials tab
  3. In the Client scopes tab, keep the email and profile scopes. You can remove all other scopes. These parameters determine which data is passed to the client during authentication. Client scopes tab
  4. Go to the Settings tab and, in the Access Settings section, fill in the following fields:
    • Root URL — domain address
    • Home URL — home page address
    • Valid redirect URIs/oidc_auth/auth
    Access Settings section

Adding Authentication in Operavix

  1. Go to the Authentication settings section and add a new authentication type — OpenID.
  2. In the window that opens, enter the URL from the issuer attribute in the Issuer URL field. Issuer URL field To view the attribute value, go to the Realm Settings tab in Keycloak and open the OpenID Endpoint Configuration link. This URL allows the Operavix system to communicate with the OIDC provider. Navigating to view the Issuer attribute
  3. Fill in the Client Authenticator, Client ID, and Client secret fields with the values from Keycloak.
  4. Click Add.
  5. Assign the created OpenID authentication to at least one Operavix user to make it available for use.

Authentication via the OIDC protocol using Client ID and Client Secret has been successfully configured. Operavix users can now perform secure authentication through Keycloak.

Was the article helpful?

Yes
No
Previous
Keytab File Creation for the Kerberos Authentication in Active Directory
We use cookies to improve our website for you.