keycloak-scim/server_admin/topics/clients/oidc/proc-creating-oidc-client.adoc

49 lines
1.7 KiB
Text
Raw Normal View History

[id="proc-creating-oidc-client_{context}"]
= Creating an OpenID Connect Client
[role="_abstract"]
To protect an application that uses the OpenID connect protocol, you create a client.
.Procedure
2020-11-13 14:09:23 +00:00
. Click *Clients* in the menu.
2020-11-11 16:00:15 +00:00
. Click *Create* to go to the *Add Client* page.
+
.Add client
image:{project_images}/add-client-oidc.png[Add Client]
2020-11-11 16:00:15 +00:00
. Enter any name for *Client ID.*
2020-11-11 16:00:15 +00:00
. Select *openid-connect* in the *Client Protocol* drop down box.
2020-11-11 16:00:15 +00:00
. Enter the base URL of your application in the *Root URL* field.
. Click *Save*.
ifdef::api-management[]
. Configure the client permissions
2020-11-11 16:00:15 +00:00
.. Set *Access Type* to *confidential*.
.. Set *Standard Flow Enabled* to *OFF*.
.. Set *Direct Access Grants Enabled* to *OFF*.
.. set *Service Accounts Enabled* to *ON*.
. Set the service account roles for the client:
.. Click the *Service Account Roles* tab.
.. Click *Client Roles* and enter *realm-management*.
2020-11-11 16:00:15 +00:00
.. Under *Available Roles*, select *manage-clients*.
.. Click *Add selected >>* to move *manage-clients* under *Assigned Roles*.
. Note the client credentials
.. On the Credentials tab, make a note of the Secret field
2020-11-11 16:00:15 +00:00
.. On the *Settings* tab, make note the client ID that you assigned.
. Click *Save*.
endif::[]
ifdef::standalone[]
2020-11-11 16:00:15 +00:00
This action creates the client and bring you to the *Settings*
tab.
2020-11-05 20:50:14 +00:00
.Client settings
image:{project_images}/client-settings-oidc.png[Client Settings]
[role="_additional-resources"]
.Additional resources
* For more information about the OIDC protocol, see xref:con-oidc_{context}[OpenID Connect].
endif::[]