Configuring SAML Authentication in Keycloak
In this article
To configure SAML authentication in Keycloak, follow the steps described below.
- Sign in to Keycloak. Go to the Realm settings section and download the file from the SAML 2.0 Identity Provider Metadata link.
- Sign in to the Operavix system. Open the Authentication section, click the Add button, and then select SAML.
- Export the service provider metadata file. You will need it to upload into Keycloak. Import the file downloaded in step 1 into Operavix, select the attribute for matching, and add the authentication.
- In Keycloak, go to the Clients section and open the Import clients tab.
- In the Resource file field, upload the metadata exported from Operavix and click Save.
Authentication is configured and ready for use.
Important
If you encounter the error {"code":"saml_auth_error","error":"Found an Attribute element with duplicated Name"} during SAML authentication, go to the Mapper details section in Keycloak and enable the Single Role Attribute option.
The attribute for matching must be in the same format as the nameId parameter of your IdP. To synchronize Keycloak with Operavix via email, the nameID parameter format must match the format of the E-mail field in the employee profile:
- Go to the Client scopes section and select the desired client scope.
- Select Configure a new mapper, then choose User Attribute Mapper For NameID.
- In the User Attribute field, specify email and click Save.
Was the article helpful?
Yes
No