Skip to content

Commit ec1be23

Browse files
Update Deploy-Keycloak-Authentication.md (#72)
Signed-off-by: bibhuti230185 <bibhuti230185@gmail.com>
1 parent bdffee5 commit ec1be23

File tree

2 files changed

+35
-0
lines changed

2 files changed

+35
-0
lines changed

content/en/docs/Deployment/Deploy-Keycloak-Authentication.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -234,6 +234,41 @@ sw360-keycloak-user-storage-provider.jar
234234
the *Credentials* page.
235235

236236
{{< figure src="/sw360/img/keycloak/keycloak-users-password.png" >}}
237+
## Adding Identity Providers in Keycloak for Azure AD Integration
238+
239+
### Prerequisites
240+
- Keycloak 26.0.5 installed and running
241+
- Azure AD tenant with necessary permissions
242+
243+
### Step 1: Create an Application in Azure AD
244+
### Step 2: Configure the Application
245+
### Step 3: Configure Keycloak
246+
1. Log in to the Keycloak admin console.
247+
2. Select the realm sw360 to add the identity provider.
248+
3. Go to **Identity Providers** and select **OpenID Connect v1.0** from the dropdown.
249+
4. Fill in the following details:
250+
- **Alias**: `azure-foss360`
251+
- **Display Name**: `Login with AzureAD`
252+
- **Authorization URL**: `https://login.microsoftonline.com/<your-tenant-id>/oauth2/v2.0/authorize`
253+
- **Token URL**: `https://login.microsoftonline.com/<your-tenant-id>/oauth2/v2.0/token`
254+
- **Logout URL**: `https://login.microsoftonline.com/<your-tenant-id>/oauth2/v2.0/logout`
255+
- **User Info URL**: `https://graph.microsoft.com/oidc/userinfo`
256+
- **Issuer**: `https://login.microsoftonline.com/<your-tenant-id>/v2.0`
257+
- **JWKS URL**: `https://login.microsoftonline.com/<your-tenant-id>/discovery/v2.0/keys`
258+
- **Validate Signatures**: ON
259+
- **Use JWKS URL**: ON
260+
- **Trust Email**: ON
261+
- **Client ID**: The Application (client) ID from Azure AD
262+
- **Client Secret**: The client secret you created in Azure AD
263+
- **Default Scopes**: `openid profile email`
264+
5. Click **Save**.
265+
266+
### Step 4: Test the Integration
267+
1. Click on Authentication from Left hand Configure Group section
268+
2. Click on Browser Flow
269+
3. Click config of Identity Provider Redirector {{< figure src="/sw360/img/keycloak/keycloak-browser-flow-identity-provider-redirector-config.png" >}}
270+
4. Provide Default Identity Provider as the value which was given in Identity Providers Alias ( e.g. `azure-foss360` in previous section) and click on save.
271+
5. With this configuration update now access http://localhost:8080 and verify the automatic login with Azure ID redirect.
237272

238273
## Clone SW360 Frontend Repository
239274

109 KB
Loading

0 commit comments

Comments
 (0)