Keycloak OIDC Configuration
Pro only
Configuration at your OIDC provider
- Create new Keycloak client for authentication and generate
client_idand aclient_secret - Add the callback-url: https://
<your-installation>/login/oidc/keycloak/callback- Add the hostname where your SysReptor installation can be accessed.
SysReptor Configuration
Create your OIDC configuration for SysReptor...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 | |
...and add it to your application settings (OIDC_AUTHLIB_OAUTH_CLIENTS).
The OIDC client needs to be able to establish a network connection to Keycloak. Make sure to not block outgoing traffic.
Other JSON fields, user_identifier_claim, and SSO limitations are covered in Generic OIDC configuration and Limitations.
Keycloak: email_verified
Keycloak sets email_verified from the per-user “Email Verified” flag. Users created via API, imported, or brokered from another IdP may stay false until Keycloak’s email verification (realm “Verify Email”), an admin sets the flag, or the upstream IdP uses Trust Email so Keycloak trusts the address. Prefer "require_email_verified": true once Keycloak reliably emits email_verified=true for your users.
Edit / View on GitHub