Skip to main content

IdP Wizard

The Organization IdP Wizard allows members of an organization with appropriate permissions to self-manage their organization's identity providers. It allows users to set up and configure SAML and OIDC identity providers for their organization without requiring intervention from IT support or administrators.

There are two mechanisms of creating an IdP Wizard link. Choosing one depends on how you wish to expose this to your users.

Admin UI

In the Admin UI, in the Organizations tab, when you select an organization, the upper right context menu allows you to select "Create IdP Wizard link". This will create an IdP Wizard link for the default organization user. This is a user that is created by default when the organization is created for the purpose of executing administrative tasks for the organization. It is not associated with a real member of the organization. It has full privileges within the organization, so be careful who and how this link is distributed. It will be active for 1 day following creation.

IdP Wizard link creation in Keycloak Admin UI
Create an IdP Wizard Link

API

You can programmatically create IdP Wizard links for your users with the API. This allows you to create a link for a specific user. The portal itself will take care of restricting access based on that user's organization permissions. Please refer to the API documentation to create a link for the organization's admin portal. Because this is an expiring link, it is recommended that you do not create the link until it has been selected in your application.

API Link

Setting Realm Attributes for Manual Control

There are some reasonable defaults used for the configuration, but the behavior of the wizards depends on a few variables, stored as Realm attributes. View Github repo about configuration.

Realm attribute keyDefaultDescription
_providerConfig.wizard.apiModeonpremonprem or cloud. onprem uses the Keycloak Admin APIs to set up an Identity Provider, so the user must have the correct realm-management roles. cloud uses the Phase Two Organizations API, so the user must have membership in an organization with the correct organization roles. A "picker" will be shown to the user if they have both and/or roles in more than one organization.
_providerConfig.wizard.emailAsUsernamefalseWhen building Identity Provider mappers, should the IdP email address be mapped to the Keycloak username field.
_providerConfig.wizard.enableDashboardtrueShow a minimal dashboard showing the state of the setup.
_providerConfig.wizard.enableDirectorySynctrueShow Directory Sync section.
_providerConfig.wizard.enableGroupMappingtrueCurrently does nothing.
_providerConfig.wizard.enableIdentityProvidertrueShow Identity Provider section.
_providerConfig.wizard.enableLdaptrueAllow LDAP config.
_providerConfig.wizard.enableScimtrueAllow SCIM config. (not currently used)
_providerConfig.wizard.trustEmailfalseToggle trust email in the IdP config.
_providerConfig.assets.logo.urlnoneURL for logo override. Inherited from keycloak-orgs config so we can use the same logo.
_providerConfig.wizard.appNamePhase TwoApp name to appear in the HTML title.