keycloak-scim/server_admin/topics/identity-broker/configuration.adoc

70 lines
3.9 KiB
Text
Raw Normal View History

2016-05-27 15:23:34 +00:00
[[_general-idp-config]]
2016-05-26 16:09:04 +00:00
=== General configuration
2016-05-26 16:09:04 +00:00
The foundations of the identity broker configuration are identity providers (IDPs). {project_name} creates identity providers for each realm and enables them for every application by default. Users from a realm can use any of the registered identity providers when signing in to an application.
2016-05-26 16:09:04 +00:00
.Procedure
. Click *Identity Providers* in the menu.
+
2016-05-26 16:09:04 +00:00
.Identity Providers
image:images/identity-providers.png[Identity Providers]
+
. Select an identity provider. {project_name} displays the configuration page for the identity provider you selected.
+
.Add Facebook identity Provider
image:images/add-identity-provider.png[Add Facebook Identity Provider]
+
When you configure an identity provider, the identity provider appears on the {project_name} login page as an option. You can place custom icons on the login screen for each identity provider. See link:{developerguide_link}#custom-identity-providers-icons[custom icons] for more information.
+
2016-05-26 16:09:04 +00:00
.IDP login page
image:images/identity-provider-login-page.png[]
2016-05-26 16:09:04 +00:00
Social::
Social providers enable social authentication in your realm. With {project_name}, users can log in to your application using a social network account. Supported providers include Twitter, Facebook, Google, LinkedIn, Instagram, Microsoft, PayPal, Openshift v3, GitHub, GitLab, Bitbucket, and Stack Overflow.
2016-05-26 16:09:04 +00:00
Protocol-based::
Protocol-based providers rely on specific protocols to authenticate and authorize users. Using these providers, you can connect to any identity provider compliant with a specific protocol. {project_name} provides support for SAML v2.0 and OpenID Connect v1.0 protocols. You can configure and broker any identity provider based on these open standards.
2016-05-26 16:09:04 +00:00
Although each type of identity provider has its configuration options, all share a common configuration. The following configuration options available:
2016-05-26 16:09:04 +00:00
.Common Configuration
[cols="1,1", options="header"]
|===
|Configuration|Description
|Alias
|The alias is a unique identifier for an identity provider and references an internal identity provider. {project_name} uses the alias to build redirect URIs for OpenID Connect protocols that require a redirect URI or callback URL to communicate with an identity provider. All identity providers must have an alias. Alias examples include `facebook`, `google`, and `idp.acme.com`.
2016-05-26 16:09:04 +00:00
|Enabled
|Toggles the provider ON or OFF.
2016-05-26 16:09:04 +00:00
|Hide on Login Page
|When *ON*, {project_name} does not display this provider as a login option on the login page. Clients can request this provider by using the 'kc_idp_hint' parameter in the URL to request a login.
2017-03-09 21:21:37 +00:00
|Account Linking Only
|When *ON*, {project_name} links existing accounts with this provider. This provider cannot log users in, and {project_name} does not display this provider as an option on the login page.
2017-03-09 21:21:37 +00:00
2016-05-26 16:09:04 +00:00
|Store Tokens
|When *ON*, {project_name} stores tokens from the identity provider.
2016-05-26 16:09:04 +00:00
|Stored Tokens Readable
|When *ON*, users can retrieve the stored identity provider token. This action also applies to the _broker_ client-level role _read token_.
2016-05-26 16:09:04 +00:00
|Trust Email
|When *ON*, {project_name} trusts email addresses from the identity provider. If the realm requires email validation, users that log in from this identity provider do not need to perform the email verification process.
2016-05-26 16:09:04 +00:00
|GUI Order
|The sort order of the available identity providers on the login page.
2016-05-26 16:09:04 +00:00
|First Login Flow
|The authentication flow {project_name} triggers when users use this identity provider to log into {project_name} for the first time.
2016-05-26 16:09:04 +00:00
|Post Login Flow
|The authentication flow {project_name} triggers when a user finishes logging in with the external identity provider.
|Sync Mode
|Strategy to update user information from the identity provider through mappers. When choosing *legacy*, {project_name} used the current behavior. *Import* does not update user data and *force* updates user data when possible. See <<_mappers, Identity Provider Mappers>> for more information.
2016-05-26 16:09:04 +00:00
|===