@@ -234,6 +234,41 @@ sw360-keycloak-user-storage-provider.jar
234234 the * Credentials* page.
235235
236236 {{< figure src="/sw360/img/keycloak/keycloak-users-password.png" >}}
237+ ## Adding Identity Providers in Keycloak for Azure AD Integration
238+
239+ ### Prerequisites
240+ - Keycloak 26.0.5 installed and running
241+ - Azure AD tenant with necessary permissions
242+
243+ ### Step 1: Create an Application in Azure AD
244+ ### Step 2: Configure the Application
245+ ### Step 3: Configure Keycloak
246+ 1 . Log in to the Keycloak admin console.
247+ 2 . Select the realm sw360 to add the identity provider.
248+ 3 . Go to ** Identity Providers** and select ** OpenID Connect v1.0** from the dropdown.
249+ 4 . Fill in the following details:
250+ - ** Alias** : ` azure-foss360 `
251+ - ** Display Name** : ` Login with AzureAD `
252+ - ** Authorization URL** : ` https://login.microsoftonline.com/<your-tenant-id>/oauth2/v2.0/authorize `
253+ - ** Token URL** : ` https://login.microsoftonline.com/<your-tenant-id>/oauth2/v2.0/token `
254+ - ** Logout URL** : ` https://login.microsoftonline.com/<your-tenant-id>/oauth2/v2.0/logout `
255+ - ** User Info URL** : ` https://graph.microsoft.com/oidc/userinfo `
256+ - ** Issuer** : ` https://login.microsoftonline.com/<your-tenant-id>/v2.0 `
257+ - ** JWKS URL** : ` https://login.microsoftonline.com/<your-tenant-id>/discovery/v2.0/keys `
258+ - ** Validate Signatures** : ON
259+ - ** Use JWKS URL** : ON
260+ - ** Trust Email** : ON
261+ - ** Client ID** : The Application (client) ID from Azure AD
262+ - ** Client Secret** : The client secret you created in Azure AD
263+ - ** Default Scopes** : ` openid profile email `
264+ 5 . Click ** Save** .
265+
266+ ### Step 4: Test the Integration
267+ 1 . Click on Authentication from Left hand Configure Group section
268+ 2 . Click on Browser Flow
269+ 3 . Click config of Identity Provider Redirector {{< figure src="/sw360/img/keycloak/keycloak-browser-flow-identity-provider-redirector-config.png" >}}
270+ 4 . Provide Default Identity Provider as the value which was given in Identity Providers Alias ( e.g. ` azure-foss360 ` in previous section) and click on save.
271+ 5 . With this configuration update now access http://localhost:8080 and verify the automatic login with Azure ID redirect.
237272
238273## Clone SW360 Frontend Repository
239274
0 commit comments