OpenID Bridge Integration Guide - Keycloak
Keycloak is an open source provider for Identity and Access Management (IAM) and is used for single sign-on.
OpenID Bridge integration with Keycloak requires configuration of a new identity provider. The following integration steps cover the critical elements needed for OpenID Bridge. Your particular Keycloak integration may involve other elements.
Before you begin
You'll need:
- Admin access to Keycloak account
- Client redirect URI, where Keycloak will send users upon login
Create a new identity provider
First we need to add OpenID Bridge as an identity provider in Keycloak.
-
Sign in to Keycloak as an admin user.
-
Open the Administration console and navigate to the realm for which you want to integrate OpenID Bridge.
-
In the Configure section of the left navbar, select Identity providers.
-
Select the Add providers drop-down and select OpenID Connect v1.0.
-
Create an Alias and copy the resulting Redirect URI for later use.
-
Choose a helpful Display name that fits your use case.
- For example, "Sign on with EUDI Wallet".
-
If you have several single sign-on providers already, choose a Display order.
-
Ensure the Use discovery endpoint toggle is activated.
-
In the Discovery endpoint field, paste your OpenID Bridge discovery endpoint.
- This should take the following form:
https://{YOUR-BRIDGE-URL}/.well-known/openid-configuration.
→ Keycloak uses this to gather important metadata such as token and authorization endpoints. Note the user info URL for user profile data.
- This should take the following form:
-
In the Client authentication drop-down, make sure "Client secret sent as post" is selected.
-
Choose a Client ID and a Client Secret, making sure to securely note these values as they must be used later during OpenID Bridge configuration.
-
In the Client assertion signature algorithm field, choose "Algorithm not specified" unless there is a particular need to do otherwise.
-
Select Add to complete Keycloak configuration.
Set client redirect URI
Next we tell Keycloak where to send users on login.
-
In the Manage section of the left navbar, select Clients.
-
In the Clients list, select the client which you're integrating OpenID Bridge into.
-
Under Access settings, enter the client's redirect URI into the Valid redirect URIs field.
-
Save your changes to the client settings.
Configure OpenID Bridge
With OpenID Bridge configured as a new identity provider in your Keycloak, now a new provider must be created in OpenID Bridge.
-
Choose a proof schema following the provided guidance. You will use values from the chosen proof schema in the next step.
-
Create a new provider in OpenID Bridge following the provided instructions. Use the following values from your Keycloak configuration:
- Client ID
- Client Secret
- Redirect URI
On the sign-in page of your Keycloak integration, there should now be an option to sign in with OpenID Bridge.