SSO With Keycloak
Last modified on July 2, 2024
On this page
This guide provides step-by-step instructions on how to configure single sign-on (SSO) with Keycloak. You already use Keycloak to conveniently manage permissions to applications. After SSO configuration is complete, you’ll also be able to use Keycloak to manage permissions to your Datasources.
Steps
- In your Keycloak admin console, go to the Clients section and click Create to add a client.
- On the Add Client page, enter basic information and then save:
- Client ID: Enter a name like StrongDM.
- Client Protocol: Select openid-connect.
- Root URL: Enter
https://app.strongdm.com
.
- On the Settings tab, do the following:
- Ensure that Client Protocol is openid-connect.
- Set Access Type to confidential.
- Under Valid Redirect URIs, add the following URLS:
https://app.strongdm.com/auth/return
andhttps://app.strongdm.com/auth/return
. - Other fields are optional and can be set as you prefer. When done, click Save.
- On the Credentials tab, copy the Secret value. You will need this in the next step.
- Next, enter the account details in the StrongDM Admin UI. Go to Settings > User Management. In the Single Sign-on section, set the following:
- Provider: Select Keycloak.
- Single sign-on URL: Add your URL (add
/auth/realms/<REALM_NAME>
to your Keycloak base URL). - Client ID: Enter your client ID.
- Client Secret: Paste the secret that you copied previously.
- Select your desired general SSO settings and click activate.
- Verify that all users in StrongDM exist in Keycloak.
Want to see StrongDM’s capabilities beyond SSO with Keycloak? Learn more about how it works or get a demo to see it in action.