You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p><strong>Keycloak</strong> is a robust, open-source Identity and Access Management (IAM) tool that implements popular SSO standards like <strong>SAML</strong> and <strong>OpenID Connect (OIDC)</strong>.<br/>
23893
23893
It’s widely trusted for secure authentication in on-premise deployments, enabling organizations to centralize user identity and integrate easily with various services.</p>
23894
-
<p>This step-by-step guide will help you:
23895
-
- Register a new OIDC client in Keycloak.
23896
-
- Set up an OIDC Connector in <strong>Pydio Cells</strong>.
23897
-
- Map user attributes from Keycloak (using LDAP directory) to user roles in Pydio Cells.
23898
-
- Understand how to fix session-related issues and debug your configuration.</p>
23894
+
<p>This step-by-step guide will help you:</p>
23895
+
<ul>
23896
+
<li>Register a new OIDC client in Keycloak.</li>
23897
+
<li>Set up an OIDC Connector in <strong>Pydio Cells</strong>.</li>
23898
+
<li>Map user attributes from Keycloak (using LDAP directory) to user roles in Pydio Cells.</li>
23899
+
<li>Understand how to fix session-related issues and debug your configuration.</li>
23900
+
</ul>
23899
23901
<h2id="s1-register-a-new-oidc-client-in-keycloak">S1. Register a New OIDC Client in Keycloak<aclass="headerlink" href="#s1-register-a-new-oidc-client-in-keycloak" title="Permanent link">¶</a></h2>
23900
23902
<p>To enable SSO, first register a new client that represents Pydio Cells in your Keycloak instance.</p>
23901
23903
<blockquote>
@@ -23906,21 +23908,27 @@ <h2 id="s1-register-a-new-oidc-client-in-keycloak">S1. Register a New OIDC Clien
<p>Enabling <code>Cells Authentication</code> generates a <strong>Client Secret</strong>. Pydio Cells uses this secret to securely authenticate with Keycloak’s OIDC endpoints.</p>
@@ -23930,30 +23938,38 @@ <h2 id="s2-create-a-new-connector-in-pydio-cells">S2. Create a New Connector in
23930
23938
<p><strong>Cells Admin Console:</strong><br/>
23931
23939
<divclass="highlight"><tableclass="highlighttable"><tr><tdclass="linenos"><divclass="linenodiv"><pre><span></span><spanclass="normal"><ahref="#__codelineno-1-1">1</a></span></pre></div></td><tdclass="code"><div><pre><span></span><code><aid="__codelineno-1-1" name="__codelineno-1-1"></a>Settings → Authentication → OAUTH2/OIDC → Create New Connector
23932
23940
</code></pre></div></td></tr></table></div></p>
23933
-
<p>In the pop-up:
23934
-
- <strong>Connector type:</strong> OpenID Connect
23935
-
- <strong>ID:</strong><code>keycloak</code> (won't be changed)
23936
-
- <strong>Name:</strong> Example: <code>SSO with Keycloak</code> (can be customized later)</p>
<li><strong>ID:</strong><code>keycloak</code> (won't be changed)</li>
23945
+
<li><strong>Name:</strong> Example: <code>SSO with Keycloak</code> (can be customized later)</li>
23946
+
</ul>
23937
23947
<p>The <strong>Issuer (Canonical URL)</strong> updates automatically based on the ID. This URL acts as the callback where Keycloak sends tokens after authentication.</p>
<h3id="2-create-a-client-scope-and-mapper">2. Create a Client Scope and Mapper<aclass="headerlink" href="#2-create-a-client-scope-and-mapper" title="Permanent link">¶</a></h3>
23977
23995
<p><strong>Keycloak Admin Console:</strong><br/>
@@ -23982,17 +24000,19 @@ <h3 id="2-create-a-client-scope-and-mapper">2. Create a Client Scope and Mapper<
0 commit comments