Keycloak is an open-source identity and access management solution that provides a comprehensive set of tools and features, helping developers quickly implement secure user authentication and authorization mechanisms while simplifying identity and access management processes for applications.
提示
This article does not cover Keycloak deployment and detailed explanations. For more information, please refer to the official documentation
1.1 Get the ACS URL from FlashDuty (needed in step 2) 1.2 Path: Access Control => Single Sign-On => Settings => SAML 2.0 Protocol => Flashcat Service Provider Information => Assertion Consumer Service URL
3.1 Change Name ID format to email type3.2 Set Client signature required to OFF3.3 Create Client scope
提示
Before creating, you need to delete previous OpenID Connect protocol users. After creation, set it as Default
3.3.1 Create email/phone/username types following the image below3.3.2 Final result after creation3.4 Add users to the Client3.5 Configure email/phone/username mappers (using email as an example, follow the same steps for others)
1.1 Get Redirect URL from FlashDuty (needed in step 2) 2.2 Path: Access Control => Single Sign-On => Settings => OIDC Protocol => Flashcat Service Provider Information => Redirect URL
3.1 Client ID: The ID entered when creating the Client 3.2 Client Secret: Found in Client details => Credentials card3.3 Issuer: Realm settings => Endpoints => OpenID Endpoint Configuration