keycloak-scim/server_admin/topics/clients/oidc/proc-creating-oidc-client.adoc
2021-09-21 08:58:46 +02:00

50 lines
1.8 KiB
Text

[id="proc-creating-oidc-client_{context}"]
==== Creating an OpenID Connect Client
[role="_abstract"]
To protect an application that uses the OpenID connect protocol, you create a client.
.Procedure
. Click *Clients* in the left navigation pane.
. Click *Create* to go to the *Add Client* page.
+
.Add Client
image:{project_images}/add-client-oidc.png[Add Client]
. Enter any name for *Client ID.*
. Select *openid-connect* in the *Client Protocol* drop down box.
. Enter the base URL of your application in the *Root URL* field.
. Click *Save*.
ifdef::api-management[]
. Configure the client permissions
.. Set *Access Type* to *confidential*.
.. Set *Standard Flow Enabled* to *OFF*.
.. Set *Direct Access Grants Enabled* to *OFF*.
.. set *Service Accounts Enabled* to *ON*.
. Set the service account roles for the client:
.. Click the *Service Account Roles* tab.
.. Click *Client Roles* and enter *realm-management*.
.. Under *Available Roles*, select *manage-clients*.
.. Click *Add selected >>* to move *manage-clients* under *Assigned Roles*.
. Note the client credentials
.. On the Credentials tab, make a note of the Secret field
.. On the *Settings* tab, make note the client ID that you assigned.
. Click *Save*.
endif::[]
ifdef::standalone[]
This action creates the client and bring you to the *Settings*
tab.
.Client Settings
image:{project_images}/client-settings-oidc.png[Client Settings]
[role="_additional-resources"]
.Additional resources
* For more information about fields on the *Settings* tab, see xref:con-basic-settings_{context}[Basic Settings].
* For more information about the OIDC protocol, see xref:con-oidc_{context}[OpenID Connect].
endif::[]