Connecting to an OpenID Connect provider
You can connect Keycloak to an OpenID Connect (OIDC) provider. For more information, see OpenID Connect v1.0 identity providers in the Red Hat documentation.
Adding users
Connect to an OIDC identity provider by adding an identity provider to the Keycloak realm.
Log in to the Platform UI as a user with realm management permissions. For more information, see Cloud Pak roles and permissions.
Click the Navigation Menu icon next to IBM Cloud Pak for Integration in the banner, then click Administration > Access control. The Keycloak access control console opens.
In the navigation pane, click Identity providers.
Select OIDC, or if you have already created a provider, select the provider you want to edit.
Configure your Identity Provider by entering the Redirect URI that is provided by Keycloak.
Enter your OIDC settings. You can use a discovery endpoint, or turn off the Use discovery endpoint setting to configure the OIDC provider manually.
Important: If you are using API Connect cluster instances and are upgrading to Cloud Pak for Integration 16.1.1, the usernames from the identity provider that was used with the previous indentity and access system must be entered correctly when configuring Keycloak. Ensure that thepreferred_usernameclaim from your identity provider matches the usernames that are stored in the IBM API Connect access management system.Enter the Client ID and Client Secret from your identity provider.
Click Save.
Users are added to the Keycloak database when they first log in to Cloud Pak for Integration.
Mapping to groups and roles
You can add identity provider users to Keycloak groups based on attributes provided by the identity provider. For information about Keycloak groups see Managing users in Keycloak.
Log in to the Platform UI as a user with realm management permissions. For more information, see Cloud Pak roles and permissions.
Click the Navigation Menu icon next to IBM Cloud Pak for Integration in the banner, then click Administration > Access control. The Keycloak access control console opens.
In the navigation pane, click Identity providers.
Select the provider that you want to edit.
Click the Mappers tab.
Click Add Mapper
Enter a name (for example,
groups).Select the Advanced Claim to Group type.
Enter the claim used to identify that the user should be a member of the group.
Select the group to which the user should be added.
Click Save.