Top.Mail.Ru
Configuring SAML Authentication in Keycloak
CTRL+K

Configuring SAML Authentication in Keycloak

In this article
  • Configuring SAML Authentication in Keycloak

To configure SAML authentication in Keycloak, follow the steps described below.

  1. Sign in to Keycloak. Go to the Realm settings section and download the file from the SAML 2.0 Identity Provider Metadata link. Download file
  2. Sign in to the Operavix system. Open the Authentication section, click the Add button, and then select SAML.
  3. Export the service provider metadata file. You will need it to upload into Keycloak. Import the file downloaded in step 1 into Operavix, select the attribute for matching, and add the authentication. Adding authentication
  4. In Keycloak, go to the Clients section and open the Import clients tab. Import clients
  5. In the Resource file field, upload the metadata exported from Operavix and click Save. Uploading metadata and saving

Authentication is configured and ready for use.

Important

If you encounter the error {"code":"saml_auth_error","error":"Found an Attribute element with duplicated Name"} during SAML authentication, go to the Mapper details section in Keycloak and enable the Single Role Attribute option.

Single Role Attribute

The attribute for matching must be in the same format as the nameId parameter of your IdP. To synchronize Keycloak with Operavix via email, the nameID parameter format must match the format of the E-mail field in the employee profile:

  1. Go to the Client scopes section and select the desired client scope. Client scope
  2. Select Configure a new mapper, then choose User Attribute Mapper For NameID.
  3. In the User Attribute field, specify email and click Save. email

Was the article helpful?

Yes
No
Previous
Configuring Authentication Using OpenID Connect and Keycloak
We use cookies to improve our website for you.