In keycloak
- Set the realm IPAM will auth with
- Click
Client Scopeson the left menu - Click
role_list (saml), should have saml next to it - Click
Mappersat the top - Click
role list - Set
Single Role AttributetoONand press save - On the breadcrumbs at the top, click
Client Scopes
Now you need to create the Client
- Click
Clientson the left menu - Click
Createon the right - Give your Client an ID
- Set the Protocol to
saml - Set the
Client SAML Endpointtohttps://<YOUR URL>/saml2 - Click Save
Now you need to add a redirect URI and a base URL
- Find
Valid Redirect URIsand addhttps://<YOUR URL>/* - Find
Base URLand set tohttps://<YOUR URL> - Click save at the bottom.
Setup IPAM
- Login as an Admin
- On the
Administration, selectAuthentication methods - From the
Create newbutton, selectCreate new SAML2 authentication - set the
Description - set
Client IDto the value of the Keycloak client - set
IDP issuertohttps://<keycloak URL>/auth/realms/<REALM> - set
IDP login urlandIDP logout urltohttps://<keycloak URL>/auth/realms/<REALM>/protocol/saml - set
IDP X.509 public certfrom the cert in keycloak- click
Realm Settingson the left in keycloak - click
Keysat the top - under
Public keys, click the topCertificateand copy the text - now paste in to
IDP X.509 public certin IPAM
- click
- set
Authn X.509 signing certto thePrivate Keyof the keycloak client- Click
Clientson the left menu in keycloak - click the client you set for PHPIPAM
- click keys at the top
- copy the
Private Keyand past into IPAM
- Click
- set
Authn X.509 signing cert keyto theCertificateof the keycloak client- Click
Clientson the left menu in keycloak - click the client you set for PHPIPAM
- click keys at the top
- copy the
Certificateand past into IPAM
- Click
- leave
SAML username attributeblank - click Add