Configuring Flipt to enable login with Keycloak via OIDC
admin
/admin
).
flipt
:
Keycloak
in the top-left corner.Create realm
button.flipt
as the realm name.Create
button.user
:
Users
tab.Create new user
button.Create
button.Credentials
tab and click Set Password
.Temporary
to OFF
so that the user does not need to change their password on the first login.Save
.flipt
:
Clients
tab.Create Client
button.OpenID Connect
is selected as the client type.flipt
as the client ID and click on Next
.Standard flow
and Direct access grants
are enabled and click on Next
.Valid Redirect URIs
to http://localhost:8081/auth/v1/method/oidc/keycloak/callback
.Web Origins
to http://localhost:8081
.Client authentication
is set to ON
.Save
.flipt
client, click on the Credentials
tab.flipt
). Copy this value and save it for later.Client Secret
field to copy the client secret. Save this value for later.issuer
URL from the JSON response. This will be used as the issuer_url
in the Flipt configuration.config.yml
config.yml
in the current directory.
This file will tell Flipt to increase its logging level to the maximum to aid in debugging. We will also set the HTTP port to 8081
to avoid conflicts with Keycloak.
It will also set authentication as required = true
.
This is needed to ensure that Flipt enforces its APIs and must be provided with a credential of some sort to gain access.
keycloak
provider to config.yml
config.yml
file, add the following configuration in the authentication
section to enable the OIDC method and configure the Keycloak provider:
oidc
method, and it has a section called providers
. Each key beneath the providers
section is unique and can be whatever you want. However, the name is important as it affects the redirect_url
generated for the particular provider.
Each provider section has a consistent structure. You’re required to provide the issuer_url
, client_id
, client_secret
and redirect_address
.
The scopes
section is optional, and allows Flipt the opportunity to obtain additional details on the authenticating caller (e.g. email and profile picture).
Login with Keycloak
you should be navigated away to your Keycloak instance to complete the authentication flow.