Configuring the Identity Provider
Configuring the Identity Provider

Configuring the Identity Provider

Use the information from the SAML Descriptor file to configure the Identity Provider.
  1. Click on
    Identity Providers
    in the left pane of the Keycloak user interface.
  2. Select
    SAML v2.0
    from the Add Provider drop down menu.
  3. Configure Oauth.
    1. Enter the redirect URL in the
      Redirect URI
      field.
      The Redirect URI entry is constructed as follows:
      https://wfc-keycloak.pttpro.zebra.com/auth/realms/<realm-name>/broker/<alias>/endpoint
      The
      <Alias>
      is a convenient label. Change it to an appropriate value. In this example, the alias is
      WFC-SAML-Auth
      that results in the following redirect URI:
      https://wfc-keycloak.pttpro.zebra.com/auth/realms/WFC-SAML-Test-Realm/broker/WFC-SAML-Auth/endpoint
    2. Set
      Enable
      to on.
  4. Configure SAML.
    1. Enter the single sign-on URL in the
      Single Sign-On URL Service
      field.
      The Single Sign-On Service URL can be copied from the
      <SingleSignOnService>
      paramter in the SAML Descriptor file. In this example it is:
      https://wfc-keycloak2.pttpro.zebra.com/auth/realms/WFC-SAML-Test-Realm/protocol/saml
    2. Enter the single logout service URL in the
      Single Logout Service URL
      field.
      The Single Logout Service URL can be copied from the
      <SingleLogoutService>
      parameter in the SAML Description file.
    3. Enable
      Validate Signature
      .
    4. Enable
      HTTP-POST Binding Response
      .
    5. Enable
      HTTP-POST Binding for AuthnRequest
      .
    6. Enable
      HTTP-POST Binding Logout
      .
    7. Enable
      Want AuthnRequests Signed
      .
  5. Click
    Save
    .
Entering these URLs causes the WFC-ACS service to read the descriptor file and populate the x509 Certificate and the Signature Algorithm fields.