Skip to content

This is a documentation update for newer Keycloak versions [issue#11690](https://github.com/cBioPortal/cbioportal/issues/11690)#11900

Open
eliaslautensack wants to merge 7 commits intocBioPortal:masterfrom
eliaslautensack:patch-1
Open

This is a documentation update for newer Keycloak versions [issue#11690](https://github.com/cBioPortal/cbioportal/issues/11690)#11900
eliaslautensack wants to merge 7 commits intocBioPortal:masterfrom
eliaslautensack:patch-1

Conversation

@eliaslautensack
Copy link

This PR contains a updated keycloak dokumentation. One Chapter Generating Signing Key probably needs further changes as i'am not able to validate if this is unneccessary or my config is wrong at the moment.

The other chapters were correctly addapted to keycloak version 26.2.4.

The issues:
issue#11690
issue#11360
are related to this.

Best regards
Elias

@dippindots dippindots self-requested a review January 6, 2026 16:13
Copy link
Collaborator

@dippindots dippindots left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@eliaslautensack Thank you so much for puting together the updated setup doc for keycloak! We will review this doc and testing it next week.

@dippindots dippindots requested a review from haynescd January 22, 2026 16:43
Copy link
Collaborator

@haynescd haynescd left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks, good!! had some small changes

3. To create a SAML client, go to the **Clients** item in the left menu. On this page, click the **Create** button on the right. This will bring you to the **Add Client** page.
* Enter a **Client ID** for the client, e.g. '_cbioportal_', this will be the expected `issuer` value in SAML requests sent by the application.
2. Click on the Navigation **Manage realms** on the left and create a new realm with the **Create realm** button.
![](/images/previews/create-realm.png)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see any images on the render'd md. Might need to be relative path?

![](/images/previews/Export-idp-metadata-option.png)

After you've downloaded the XML file with one of the above ways, move it to `portal/src/main/resources/` if you're compiling cBioPortal yourself or if you're using the Docker container, mount the file in the `/cbioportal-webapp` folder with `-v /path/to/client-tailored-saml-idp-metadata.xml:/cbioportal-webapp/WEB-INF/classes/client-tailored-saml-idp-metadata.xml`.
** Note:** It may occur that the XML-file is not properly formatted. Please use a XML-formatting tool to repair the file in this case.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can also note that users don't have to download this. They can also just set the property to the url of where the SAML Metadata is (link is in the realm main page)

Ex. https://keycloak-qa.kf-strides.org/realms/pedcbioportal/protocol/saml/descriptor

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, I will add this. But if the output from keycloak is not well formatted, as I encountered, then using the link won't work.

saml.logout.local=false
saml.logout.url=/
```
2. Then, add the security properties for SAML authentification as described in the SAML Configuration section of the [Security Properties](/deployment/customization/security.properties-reference/#saml-configuration).
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Link not working

saml.logout.url=/
```
2. Then, add the security properties for SAML authentification as described in the SAML Configuration section of the [Security Properties](/deployment/customization/security.properties-reference/#saml-configuration).

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, in the security.properties example it would be nice to add #spring.security.saml2.relyingparty.registration.cbio-saml-idp.singlelogout.response-url=http://localhost:8080/logout/saml2/slo

to set the accepted response to logout from keycloak

@eliaslautensack
Copy link
Author

Thanks for the feedback! I hope I got everything right.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants