KeyCloak Azure Federation: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
m added basic steps (no screen caps) |
||
Line 1: | Line 1: | ||
[[Category: | [[index.php?title=Category:Integration guide]] | ||
== Related Integrations == | == Related Integrations == | ||
Line 8: | Line 8: | ||
* Login to Keycloak via AzureAD. | * Login to Keycloak via AzureAD. | ||
* Get access tokens from Keycloak using federated user account. | * Get access tokens from Keycloak using federated user account. | ||
== 1. Configure Azure AD as an OpenID Connect (OIDC) Provider == | |||
# Log into the Azure Portal. | |||
# Navigate to '''Azure Active Directory''' > '''App registrations''' > '''New registration'''. | |||
# Set a name for the app (e.g., <code>KeycloakOIDCApp</code>). | |||
# Set the redirect URI (e.g., <code>https://<keycloak-host>/realms/<realm-name>/broker/azuread/endpoint</code>). | |||
# After creation, go to '''Certificates & Secrets''' and generate a new client secret. | |||
# Note the following values: | |||
#* '''Client ID''' | |||
#* '''Client Secret''' | |||
#* '''Tenant ID''' | |||
# OIDC discovery URL format: | |||
https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration | |||
== 2. Set Up Azure AD as an Identity Provider in Keycloak == | |||
# Log into the Keycloak Admin Console. | |||
# Navigate to your realm > '''Identity Providers''' > '''Add provider''' > '''OIDC'''. | |||
# Fill in the following: | |||
#* '''Alias''': <code>azuread</code> | |||
#* '''Display Name''': <code>Azure AD</code> | |||
#* '''Client ID''': from Azure | |||
#* '''Client Secret''': from Azure | |||
#* '''Discovery URL''': from Azure | |||
#* '''Redirect URI''': should match Azure’s app registration | |||
# Save the configuration. | |||
== 3. Authenticate into Keycloak Using Azure Credentials == | |||
# Navigate to the Keycloak Account Portal: | |||
# Select '''Azure AD''' from the login options. | |||
# You will be redirected to the Azure login screen. | |||
# After authentication, a federated Keycloak user is created or linked. |
Revision as of 20:15, 14 April 2025
index.php?title=Category:Integration guide
Related Integrations
Solution Summary
- Set up AzureAD as the IDC for Keycloak.
- Login to Keycloak via AzureAD.
- Get access tokens from Keycloak using federated user account.
1. Configure Azure AD as an OpenID Connect (OIDC) Provider
- Log into the Azure Portal.
- Navigate to Azure Active Directory > App registrations > New registration.
- Set a name for the app (e.g.,
KeycloakOIDCApp
). - Set the redirect URI (e.g.,
https://<keycloak-host>/realms/<realm-name>/broker/azuread/endpoint
). - After creation, go to Certificates & Secrets and generate a new client secret.
- Note the following values:
- Client ID
- Client Secret
- Tenant ID
- OIDC discovery URL format:
https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration
2. Set Up Azure AD as an Identity Provider in Keycloak
- Log into the Keycloak Admin Console.
- Navigate to your realm > Identity Providers > Add provider > OIDC.
- Fill in the following:
- Alias:
azuread
- Display Name:
Azure AD
- Client ID: from Azure
- Client Secret: from Azure
- Discovery URL: from Azure
- Redirect URI: should match Azure’s app registration
- Alias:
- Save the configuration.
3. Authenticate into Keycloak Using Azure Credentials
- Navigate to the Keycloak Account Portal:
- Select Azure AD from the login options.
- You will be redirected to the Azure login screen.
- After authentication, a federated Keycloak user is created or linked.