Keycloak OIDC Configuration
Pro only
Configuration at your OIDC provider
- Create new Keycloak client for authentication and generate
client_idand aclient_secret - Add the callback-url: https://
<your-installation>/login/oidc/keycloak/callback- Add the hostname where your SysReptor installation can be accessed.
SysReptor Configuration
Create your OIDC configuration for SysReptor...
1 2 3 4 5 6 7 8 9 10 11 12 13 | |
...and add it to your application settings:
1 | |
The OIDC client needs to be able to establish a network connection to Keycloak. Make sure to not block outgoing traffic.
Limitations
SysReptor reauthenticates users before critical actions. It therefore requires users to enter their authentication details (e.g. password and second factor, if configured).
Your Keycloak installation might not support enforced reauthentication. Your can try to set "reauth_supported": true. If the "Enable Superuser Permissions" functionality does not work, set to this value to false.
To enforce reauthentication, users can set a password for their local SysReptor user. This will enforce reauthentication with the local user's credentials.
Edit / View on GitHub