@@ -12,8 +12,6 @@ Administration Guide's
12
12
[ Identity Brokering] ( https://www.keycloak.org/docs/latest/server_admin/#_identity_broker )
13
13
section.
14
14
15
- ![ Identity broker process] ( ../../assets/guides/deployments/SAML-process.png )
16
-
17
15
## Step 1: Create a new Realm in Keycloak
18
16
19
17
The first part of configuring the identity broker is to add a new Realm. This
@@ -69,51 +67,51 @@ Realm will be where we will add the
69
67
([ this Keycloak document] ( https://www.keycloak.org/docs/latest/server_admin/#saml-v2-0-identity-providers )
70
68
provides additional information about adding a SAML 2.0 Identity Provider).
71
69
72
- ![ Keycloak identity providers] ( ../../assets/guides/deployments/keycloak-identity-providers .png )
70
+ ![ Keycloak identity providers] ( ../../assets/guides/deployments/SAML-config-3 .png )
73
71
74
72
1 . On the IdP configuration page, specify an ** Alias** to use for your IdP
75
73
provider.
76
74
77
75
1 . Scroll to the bottom of the configuration page and upload the IdP metadata
78
76
you exported from JumpCloud.
79
77
80
- ![ Keycloak metadata import] ( ../../assets/guides/deployments/keycloak-metadata-import .png )
78
+ ![ Keycloak metadata import] ( ../../assets/guides/deployments/SAML-config-4 .png )
81
79
82
80
### Optional: Specify JumpCloud as the default IdP
83
81
84
82
1 . Navigate to ** Authentication** .
85
83
86
84
1 . Select the ** Browser** flow from the dropdown in the top-left.
87
85
88
- ![ Default Identity Provider] ( ../../assets/guides/deployments/keycloak-default-IdP .png )
86
+ ![ Default Identity Provider] ( ../../assets/guides/deployments/SAML-config-5 .png )
89
87
90
88
1 . Find the ** Identity Provider Redirector** row and click ** Actions** >
91
89
** Config** .
92
90
93
- ![ Identity Provider Redirector] ( ../../assets/guides/deployments/keycloak-IdP-redirector .png )
91
+ ![ Identity Provider Redirector] ( ../../assets/guides/deployments/SAML-config-6 .png )
94
92
95
93
1 . Set ** Alias** and ** Default Identity Provider** to the alias of the identity
96
94
provider you created earlier.
97
95
98
- ![ Authenticator Config] ( ../../assets/guides/deployments/keycloak-authenticator- config.png )
96
+ ![ Authenticator Config] ( ../../assets/guides/deployments/SAML- config-7 .png )
99
97
100
98
## Step 4: Configure the OpenID Connect (OIDC) Connector in Keycloak
101
99
102
100
1 . Navigate to ** Clients** and click ** Create** .
103
101
104
- ![ Create Client Connector] ( ../../assets/guides/deployments/keycloak-create-client .png )
102
+ ![ Create Client Connector] ( ../../assets/guides/deployments/SAML-config-8 .png )
105
103
106
104
1 . Add a new OIDC Client to point to your Coder deployment and click ** Save** .
107
105
108
- ![ Add OIDC client] ( ../../assets/guides/deployments/keycloak-add-client .png )
106
+ ![ Add OIDC client] ( ../../assets/guides/deployments/SAML-config-9 .png )
109
107
110
108
1 . Once on the ** Clients** configuration page, set the ** Access Type** to
111
109
** Confidential** and click ** Save** .
112
110
113
111
1 . Your client configuration should look something like the following (make sure
114
112
that all of the values point to your Coder deployment):
115
113
116
- ![ Client Configuration] ( ../../assets/guides/deployments/keycloak-client- config.png )
114
+ ![ Client Configuration] ( ../../assets/guides/deployments/SAML- config-10 .png )
117
115
118
116
At this point, you can configure your Coder deployment to use the Keycloak OIDC
119
117
Connector.
@@ -129,7 +127,7 @@ Connector.
129
127
1 . Add the ** Secret** to the ** Client Secret** field (you can get this value
130
128
from the ** Credentials** page in the Keycloak Clients Configuration).
131
129
132
- ![ Keycloak Secret] ( ../../assets/guides/deployments/keycloak-secret .png )
130
+ ![ Keycloak Secret] ( ../../assets/guides/deployments/SAML-config-11 .png )
133
131
134
132
1 . Add your Keycloak instance and Realm as the ` Issuer ` . This will be a URL
135
133
formatted as follows: ` https://<my-keycloak-url>/auth/realms/<my-realm> `
0 commit comments